作者 主题: 【DT】完美主机 THE PERFECT HOST P82-105  (阅读 12060 次)

副标题: 译者:妖猫 已完成

离线 妖猫

  • Hero
  • ****
  • 帖子数: 635
  • 苹果币: 3
【DT】完美主机 THE PERFECT HOST P82-105
« 于: 2018-05-10, 周四 21:53:16 »
完美主机
THE PERFECT HOST


新矩阵协议开始实施至今,已经一年过去,我们一度熟悉的矩阵已经发生了变化。起初,我们中没人能骇任何东西,直到利用新的基础建设的秘密缓缓流出。我们中的一些人从传奇的快杰克那里学到了这秘密,但这秘密,嘛,只能说是他在做新矩阵的β测试者的时候学到的。又有些人从那些他教过的人那里学到了技巧,如此反复。而且还总有些曾经为当权者干活的人,从这一来源学到了自己的秘密技巧。无论是何种情况,我们所有人都慢慢地学到了自己能做什么。我们学会了相互丢棘刺,骇入彼此的赛博眼。不过,我们花了最长时间来理解的是在骇入主机这件事上,新矩阵意味着什么。主机,我们这堕落世界跳动着的邪恶心脏。直到最近,我们都几乎只是触及表面。转头看看,在那里有着远超我们想象的强大力量。而且,它也露出真身,其恐怖也远超我们想象。是时候来分享我们所知的一切了。是时候这里所有的骇客都该明白你们在面对的是什么,你们能获得的是什么了。不过我警告你:我不会说骇客曾经是小孩子的游戏,但现在远胜以往,如果你没有位于这场游戏的顶端,也许你最好去找些其他事情做。主机是……好吧,你会看到它们是什么的。但它们并不是为了那些担心自己技术的人准备的。
剧透 -   :
It’s been over a year since the new Matrix protocols came into effect, changing everything we knew about the Matrix. At first, none of us could hack a single thing, until the secrets of exploiting this new infrastructure trickled down from above. Some of us learned it from the legendary FastJack himself, what he’d learned as, well, what can only be described as being a beta tester for the new Matrix. And some learned from those he taught, or those who learned from those that had been taught, and so forth. And there are always some who used to work for the powers that be, who learned their secrets at the source. Whatever the case, slowly, we all learned what we could do. We learned to spike each other, and to hack each other’s cyber eyeballs. However, what took us all the longest to understand was what the new Matrix meant when it came to hacking hosts. Hosts, the beating, malign hearts of our degenerate world. Hosts, those things that jealously guard the accumulated secrets of mankind. Until very recently, we were barely scratching the surface of what we could do. Turns out, there is more power in there then we could have ever imagined. And it also turns out that all of this is more frightening than we could ever have imagined. It’s time for us to share what we know. It’s time for every one of you hackers out there to understand what you’re up against, and what you can achieve. I’m warning you though: I won’t claim hacking was ever a child’s game, but now more than ever, if you aren’t at the top of your game, maybe its best you find something else to do. Hosts are … well, you’ll see what they are. But they aren’t for those who doubt their skills.
我邀请了一个朋友谈一谈有关主机的事情。他的名字是Sterling。他是个英国侨民,在大都会(Metropole)做掮客和骇客谋生。他是少有的正直和风趣的结合体,所以如果你的活把你带到了亚马逊国,我推荐你去拜访一下他。他在行当里见过的骇客比我们大多数人可能会遇到的都要多,而他们把自己的故事告诉了他(Sterling就是有那样的影响)。所以听听他的经验吧。
译注:大都会Metropole,位于亚马逊国,是世界最大的蔓生都市群

剧透 -   :
I’ve invited a friend of mine to talk about all things host. His name is Sterling. He’s an ex-pat Brit making a living as a fixer and a hacker in Metropole. He’s a rare blend of upstanding and fun, so I recommend you look him up if business brings you down to Amazonia. Through his business, he’s talked to more hackers than most of us will ever meet, and they have all told him their stories (Sterling has that effect on you). So listen to his experience.

主机是什么? WHAT IS A HOST?

主机是什么?某种程度上,这可真是个好问题,得花上好一会儿才能真的好好审视它,但我们会好好看一看的,朋友们。主机比其他任何东西都更让世界运转不息。我这么说的次数要比人们自己说的多得多。我很相信如果明天我们眨眨眼,整个人类就此从世上消失,我们的城市、经济和基础设施会自动运行数个月,甚至数年,直到最终停滞。主机是矩阵一半的存在原因,而另一半则在于我们能在主机里相互交流。我们所做的所有其他事情,那都只是顺带着的。
剧透 -   :
What is a host? In a way, that’s a damn good question, and it’s going to take a while to really take a good look at it, but look at it we shall, my chummers. Hosts, more than any other single thing, make the world go round. I’d say ever more so than people themselves. I’m convinced that if tomorrow we blinked and mankind disappeared from the world just like that, our cities, economies and infrastructure would run by themselves for many months, maybe even years, before things truly came to a standstill. Hosts are half of why the Matrix exists, the other half of the reason being so we can communicate with said hosts. All that other stuff we do, that’s just nice to have.
所以具体来说,什么是主机?它们是巨大的矩阵结构——信封,如果你愿意这么想——里面包含了数据和对数据的操作。主机是科学家聚集起来研究新观点,开发新产品的地方,是工程师研发的地方,是卖方和市场聚集起来,找出如何让我们为华而不实的新玩意掏出新円的地方。没有不由主机掌握的科学、工程学、制造业、银行、商业或战争,或者任何人类能做的事情。它们是用来管理人力资源,接受和处理顾客订单,随即推动订单变为实际接收的现金,还有另一面,处理从供货商采购的事宜。经营现实货物的公司用主机理清他们在库房里有多少单位的产品,而经营无形产业(比如服务业)的公司会用主机管理赚钱的人员和计划。在所有这些之上的是无时无刻都记录一切的会计流程。找出一个人具体有多少钱是一项极端复杂的任务,无论花多少心思去发现别出心裁的方式,或是打破会计规则,让公司市值膨胀或紧缩(如果他们觉得自己能逃脱处罚),都不会让它变得更容易些。
剧透 -   :
So concretely, what are hosts? They are large Matrix constructs—envelopes, if you will—that contain data and operations on that data. Hosts are where scientists gather to develop new ideas and products, where engineers develop these things, and where sales and marketing gather to figure out how to get us to pay nuyen for their new geegaw. There is no science, engineering, manufacturing, banking, commerce or warfare—there isn’t anything humanity does—that isn’t handled by a host. They are used to manage human resources, to received and handle customer orders, and push orders through to actual cash reception, as well as the flip side of that, which is handling purchasing from suppliers. Corporations that deal in physical goods use hosts to figure out how many units of their products they have in their warehouses, while companies that deal with intangibles such as services use hosts to manage the people and projects that make them money. On top of all of this lies the accounting processes that underscore everything at all times. Figuring out exactly how much money one has is an extremely complex task, made no easier by the effort to discover new and inventive ways to bend or (if they think they can get away with it) break accounting rules to inflate or deflate the value of the corporation.
除了所有这些“生意中的生意”之外,许多公司还把主机用于某类的R&D。每家公司都需要创新,无论其大小如何。有些公司的需要更明显,比如那些实际的工程或科学方面的公司,但每家都有这些方面的东西。有时候比起创新产品,他们只需要在市场营销上多投入一些,就能找到新的办法,让大众把一直在卖的老一套东西再咽下去,但即便是这种市场营销也需要创新,对吧?公司经常需要为核心业务投资设立特殊主机,因为有一个定制塑模的主机是品牌形象的重要部分。当然,定制塑模并不便宜,如果公司想要在主机间同步数据,就更贵了。R&D经常需要与库存系统或会计系统挂钩,所以如果数据只在一个次级主机里,会计师就会很不安。而且相信我,没人喜欢紧张的会计。所以主机的实际执行情况常常是两方的妥协:一方是执行者想要的超专业化的环境,另一方是精打细算的会计需要的内部连接的圆形监狱。
剧透 -   :
All this “business of business” stuff aside, many corporations also use hosts for R&D of some kind or another. Every company, no matter how big or small, needs to innovate. Some needs are more obvious, such as those of actual engineering or scientific companies, but everyone has something of those aspects to them. Sometimes instead of innovating products, they just invest in marketing to find new ways to get the masses to swallow the same old trite bullshit they’ve been selling forever, but even that marketing needs to get inventive, right? Companies often need to invest in specialized hosts for their core businesses, because having a custom- sculpted host is an important part of a brand image. Custom sculpting isn’t cheap, or course, and that can get even more expensive if corporations want to sync data across hosts. R&D often needs to hook into inventory or accounting systems, so if that resides only on a secondary host, the accountants get twitchy. And trust me, nobody likes nervous accountants. So the actual execution of hosts is often a compromise between the ultra-specialized environments the doers want and the intra-connected panopticon system the bean-counters crave.
总体来说,主机承载着人类的劳动。它是我们塑造自身进化和命运的地方。当然,不幸的是,我们已经决定,宁可为了一点名声而相互敌对,也不愿意提高自身,去往更好的地方。但这对任何在过去的60年间清醒活过的人来说,应当已经并非新闻了。
作为企业阴谋诡计中自愿的卒子,在相互偷窃与洗劫的过程中,你应当已经渐渐发现,主机总是以不同的面目出现在你的工作中。当然,我们来谈一谈它们。

剧透 -   :
In sum, hosts hold humanity’s labor. It’s where we shape our evolution and destiny. Of course, unfortunately, we’ve decided that we’d rather fuck each other over fistfuls of cred rather than advance ourselves to a better place, but that should not exactly be news to anyone who has spent any part of the past sixty years awake.
As a willing pawn in the machinations of the corporations to rob and steal from each other, it should be dawning on you that hosts will often show up in your work in one shape or other. So by all means, let’s talk about them, shall we?
« 上次编辑: 2018-06-16, 周六 01:50:12 由 妖猫 »




离线 妖猫

  • Hero
  • ****
  • 帖子数: 635
  • 苹果币: 3
Re: 【DT】完美主机 THE PERFECT HOST P92-105
« 回帖 #1 于: 2018-05-12, 周六 13:54:04 »
演化 EVOLUTION

主机很聪明地被设计为让人不间歇且直觉性地使用,但这并不意味着它们内心里不是复杂的小混蛋。我要说的第一件事是,你们都是老手吗?在新协议生效后,忘记你知道的有关主机的一切吧。GOD建立新矩阵的计划成功了——也许有点太成功了。许多骇客已经注意到,比起我们最初抵达时,矩阵有了更多的需要理解的东西。作为掮客,加上身边都是些健谈的家伙,我已经整理了许多骇客的故事,而一个令人不安的故事正在浮现。我经常把矩阵视为一个巨大的、波光粼粼的水体,而主机就是上面散落的岛屿和岩石,但我从未多想过这一比喻中,水底下是什么。也许我应该看看。也许我们应该看看。
剧透 -   :
Hosts are cleverly designed to be seamlessly and intuitively used by people, but that doesn’t mean they aren’t complex little fraggers underneath it all. First thing I have to say is, all you old timers out there? Forget everything you knew about hosts before the new protocols came into effect. GOD’s little plan to make a new Matrix worked—perhaps a little too well. A lot of hackers have been noticing there is more to the Matrix than we were first led to understand. As a fixer and all around chatty kind of guy, I can confirm I’ve collated stories from many a hacker, and a disturbing story is emerging. I always thought of the Matrix as a large, rippling body of water with hosts as scattered islands and rocks, but I never gave much thought, in this analogy, to what lay underneath the water. Maybe I should have. Maybe we all should have.
在我们没有看的时候,GOD创造了一些……新东西。一些完全新的东西。我们中的某些人开始把它称为“结构层”。坦白说,我们中没人真的知道它是什么,而我们对它如何运作也绝没有完整的理解。在水体的类比中,结构层就是水底的沙。结构层连接着每座岛屿——每一个主机。这就像水底的基础结构。如果主机是灯泡,那结构层就是电网。在我们登入矩阵时,我们登入了网域。这没什么,这不是我们在说的东西。结构层处在网域底下。所有的主机都是由结构层做成的。如果主机是赛博手臂,结构层就是铬。
剧透 -   :
While we weren’t looking, GOD created something … new. Something entirely new. Some of us have started calling it the Foundation. Frankly, none of us truly know what this is, and we certainly don’t have a full understanding of how it works. The Foundation, in my watery analogy, would be the sand underneath the water. The Foundation connects every single island out there—every single host. It’s like the underlying infrastructure. If a host is a lightbulb, the Foundation is the power grid. When we log into the Matrix, we log into a grid. That’s fine. That is not what I’m talking about. The Foundation is underneath the grid. All hosts are made from the Foundation. If a host is a cyberarm, the Foundation is the chrome.
不幸的是,这就是我能讲得最清楚的东西了。我们不了解它。我知道许多骇客不会因为他们不理解的东西而停下脚步。所以,是,我还知道一些斗士冒着巨大的危险,对GOD服务器发动了袭击。我知道有些人(不应透露他们的姓名)绑架、折磨、审问了隶属于GOD的矩阵工程师,想要弄个明白。其结果令人不寒而栗:没人明白结构层。即便是矩阵大师或是那些理应掌控一切的当权者,都无法确切地知道究竟发生了什么。没人想显得无知,所以他们都假装自己知道,但没人知道多少细节。我们所知的只有,结构层是世上所有相连设备的原动力。
剧透 -   :
Unfortunately, that’s about as clear as I can be. We just don’t understand it. Now, I know plenty of hackers out there that simply won’t stand for something they don’t understand. So yes, I also know plenty of crusaders that have gone out and performed, at great risk and peril, raids against GOD servers. I know a few individuals, who shall remain nameless, that have kidnapped, tortured, and interrogated GOD-affiliated Matrix engineers to get to the bottom of this. What emerges from this is chillingly disturbing: It would appear nobody understands the Foundation. Even the masters of the Matrix, the powers-that be that supposedly control things, don’t seem to exactly know what’s going on. Nobody wants to appear ignorant, so they all pretend they know, but nobody ever goes into detail. Best we can tell is that the Foundation is the raw power of all combined devices in the world.
你们中最好的那些(可能也是最不幸的那些)可能在过去遇到过紫外光(UV)主机。这些主机拥有的计算力让它们能把每个细节都展现在虚拟现实体验中。人类的意识无法把UV主机体验和现实区分开来。因此,也没办法真的知道自己究竟是登入还是登出。即便你曾经在UV主机里待过,因为你永远也不知道自己究竟有没有登出,你的神志可能也不会相同。UV主机唯一好的地方就是它们极度稀少,如果能叫做好的地方的话。
剧透 -   :
The very best (and most unfortunate) among you, may have encountered Ultraviolet (UV) hosts in the past. These were hosts with so goddamn much computer power behind them that they got every single little goddamn detail right in their virtual reality experience. It was impossible for the human mind to distinguish a UV host experience from reality. There was thus no way to ever truly know when you had logged in or out. Even if you’d been in a UV host once, your sanity would never quite be the same, because you could never tell if/when you got out. The only saving grace of UV hosts, if you can call it that, was that they were exceedingly rare.
好吧,朋友们,结构层整个全是UV,永远都是。
我会给你们点时间细细品味的。每个该死的主机都是由这一模糊的地下室供能的。如果你到里面去,会发现里面是奇怪的、似梦的UV体验,你的意识无法把它与现实区分开。我说过的关于主机部分的仍然是真的:它们是VR结构,看起来可以像是任何东西,但你总是知道它是虚拟现实。结构层部分——没人登录进去。它是水管,是布线;用户没有必要进去。他们甚至不会知道它是否存在。

剧透 -   :
Well, chummers, the Foundation is all UV, all the time.
I’ll let that sink it a little. Every single goddamn host is powered by this nebulous undercroft that, if you log into it, is a weird, dream-like UV experience that your mind cannot distinguish from reality. Now, what I said about hosts proper is still true: They are VR constructs that can look like anything, but you always know it’s virtual reality. This Foundation bit—nobody ever logs into that. It’s the plumbing, the wiring; there is no need for users to ever go in there. They wouldn’t know how even if they knew it existed.
但肮脏的小秘密是,结构层永远在那里,支撑着主机。它运行着深层的背景进程,允许主机自我存续。我们骇客们已经开始注意到,如果你能搞明白怎么进入结构层,就能对主机获得空前的权限。通过抵达结构层,在主机的根底四处挖掘,你有时候能访问公司最黑暗最深处的秘密。
当然,只是登录进去,你的神志就已经存在着危险。你进去一次,就永远也不知道你有没有出来。反复这么做,你的意识可能会开始断裂。而那只是呆在里面——结构层有自己的防御机制要对付。没人说骇入是个容易活,朋友,但潜入深层需要一种特别的疯狂才行。

剧透 -   :
But the dirty little secret is that the Foundation is always there, and it holds the host up. It runs deep background processes that allow the host to exist and maintain itself. So what we hackers have begun noticing is that if you can figure out how to log into the Foundation, you can gain unparalleled access to a host. You can sometimes access a corp’s darkest, deepest secrets by hitting the Foundation and digging around the roots of a host.
Of course, simply by logging in, you basically risk your sanity. You do that once, you’ll never quite know if you’re ever out again. Do it repeatedly, and your mind might start snapping. And that’s just being in there—the Foundation has its own defense mechanisms to contend with. Nobody said hacking was an easy job, chummer, but it takes a special kind of crazy to get into a deep dive.
但无论如何,回到更舒服,更实在的想法来。主机的“地基”是结构层。预先说清楚,我们并不完全理解它们的关系,继续。就像我们知道的,在结构层上面那层是主机部分。在VR中,主机可以被塑模,看上去、摸上去、行为上都像什么东西。几乎每个主机都不一样,这其实并不是一件好事。主机的熟客会适应周围的现实。塑模的智慧通常会让它容易搞懂,只要你能在主机里花上一段时间。比拟和现实会揭示出合法用户做事的最佳方式。不过,对于骇客来说,它总是会很恼人。你得很快地恢复过来,搞清楚事情,不过你肯定需要分析很多图标才能发现它们是什么。
剧透 -   :
But anyway, back to more comforting, concrete thoughts. A host’s “basement” is the Foundation. We don’t fully understand their relationship, point made, moving on. On top of this Foundation layer is the host proper, as we know it. A host, in VR, can be sculpted to look, feel, and act like anything. Almost every host is going to be different, which is not really a good thing. Habitual visitors to hosts will get used to the reality around them. The wisdom of the sculpting usually makes make itself apparent once you’ve been able to spend a good amount of time in a host. The metaphors and realities will reveal optimizations for the kind of tasks legit users perform. For hackers, though, it’s always going to be annoying. You have to be fast on your feet and figure things out quickly, though you can be sure you’re going to need to analyze icons a lot to figure out what they are.
给主机塑模非常困难。它需要非常博学的程序员和执行顾问,花上好几个月才能建立起一个。有趣的是,主机并非计算机。主机并不存在在一个服务器里。你不能拿个计算机说“这是主机。”主机存在在矩阵中。所以你怎么能“拿”一个呢?结构层又出现了。就我们所知,主机是用结构层的原料注模塑造出来的——生长出来的,有些设计者可能会这么说。要获取主机,你也就需要从有GOD授权和稀少的主机建立专家的那些公司之一手里买下一个——或者你得直面结构层,未经许可地自己设计一个。现在有20多个左右的公司经营建立和售卖主机的业务。他们几乎是不停歇地一直在创造不同大小和功率的空白主机,把它们卖给买家。创造主机需要大量的科学和一点艺术,把合适的买家和合适的主机配上号则需要一点切实的接触,但每天收割的主机都有数百甚至上千个,所以实际上并不缺货。显然,更大更强的主机的花费是指数级增长的,但小主机对于夫妻店或政治俱乐部来说仍然可以承受。相比于过去,主要的差异在于,如果你想要一个主机,你就得在网域上。虽然GOD的目的可能是为非法组织收紧一点套索,其效果几乎没变。因为购买任何达到大公司级别功率的主机需要自动流程(你在线注册,付款,很快主机就能用了),暗影团体,从犯罪组织到暗影站点(包括我们爱的接入点,还有丹佛联合会或螺旋)都可以建立皮包公司,用伪造的记录保持购买主机所需的必要资质。达尼埃尔·德·拉马尔在很多方面为难我们,但起码在这方面,她没有。
剧透 -   :
Sculpting a host is very difficult. It takes very knowledgeable programmers and implementation consultants many months to set one up. What is interesting is that hosts aren’t computers. A host does not exist in a server. You can’t grab a computer and say “this is a host.” Hosts exist in the Matrix. So how do you “get” one? Again, the Foundation comes up. From what we understand, hosts are molded—grown, some designers say—from the raw stuff of the Foundation. To acquire a host, you thus have to buy one from one of the handful of corporations that have the authorization from GOD and the rare expertise to grow a host—or you have to brave a Foundation and design one on your own without permission. There currently are two dozen or so corps out there in the business of growing and selling hosts. They do this pretty much non-stop, creating virgin hosts of various sizes and power and then selling them to buyers. Growing hosts is a lot of science with a little art, and matching the right buyer to the right host takes a certain touch, but there are hundreds, possibly thousands of hosts being harvested every day, so there isn’t really a shortage. Obviously the larger, more powerful hosts cost exponentially more, but small hosts remain affordable for mom-and-pop shops or policlubs. The major difference in how things work compared to the past is that if you want a host, you have to be on the grid. While GOD’s intention might have been to tighten the noose a little here for illegitimate organizations, in effect little changed. As buying any host up to the kind of power large corps require is largely an autonomous process (you register online, pay, and shortly a host is made available to you), shadow groups ranging from organized crime to shadow sites (including our beloved JackPoint, but also our friends like the Nexus or the Helix) have had no problem setting up shell corps with falsified records to obtain the necessary credentials to buy hosts. Danielle de la Mar may have gotten us on a lot of fronts, but at least she didn’t get us on this one.
不过,对于合法团体来说,购买主机可就不需要费神了。比起获取主机空间,塑模需要更大的投入。公司可以依照意愿,要多少分区主机都行。制约因素往往是实用性。主机间的通讯显然是可能的,但把数据都放在一个主机里要更有效率。首要的规则是,大多数主机会给每个现实部门和法律实体都建立主机。举例来说,阿瑞斯西雅图娱乐(Ares Entertainment Seattle)可能会是一个单独的主机,而阿瑞斯曼哈顿娱乐(Ares Entertainment Manhattan)则是另一个——而不是阿瑞斯娱乐或者阿瑞斯北美娱乐的整体。这并非固定规则,完全取决于具体公司的IT老板如何决定。有些公司每个附属机构都有主机,而某些公司则把多个国家的多个部门合并在一起。它完全取决于经营的需要。
剧透 -   :
For legitimate groups, though, buying hosts is a no-brainer. Sculpting it is a bigger investment than acquiring the host space itself. Corporations can have as many distinct hosts as they wish. The limiting factor is usually functionality. Host-to-host communication is certainly possible, but keeping data cohesively within a single host is much more effective. As a rule of thumb, most corps will maintain one host per physical office and legal entity. For example, Ares Entertainment Seattle would be a single host, and Ares Entertainment Manhattan another—rather than a single host for Ares Entertainment as a whole or even Ares Entertainment North America. This isn’t a fixed rule and is entirely dependent on what the IT honchos of said corporation decide. Some corporations have multiple hosts per subsidiary, some have hosts that consolidate multiple offices in multiple countries. It really all depends on operational needs.
« 上次编辑: 2018-07-19, 周四 17:53:17 由 妖猫 »




离线 妖猫

  • Hero
  • ****
  • 帖子数: 635
  • 苹果币: 3
Re: 【DT】完美主机 THE PERFECT HOST P92-105
« 回帖 #2 于: 2018-05-12, 周六 19:58:08 »
安保应对 SECURITY RESPONSE

在达尼埃尔·德·拉马尔受到公司法庭的委托,要为新矩阵创设指导方针的时候,她的唯一目标就是让信息犯罪者(骇客)尽可能地不好过。矩阵防御的第一道防线就是它自己。主机可怕地难以骇入——起码公司用于自己肮脏生意的那些是这样。主机通常能在火力上压过侵入骇客的原始力量。与其相关的是主机布置IC的能力。只是拖缓骇客的温顺程序已经不在了。现代IC的致命程度就和它无穷无尽的程度一样。由于主机有无穷的能力来施放更多IC,与其战斗几乎是愚蠢的。
剧透 -   :
When Danielle de la Mar received the mandate from the Corporate Court to create guidelines for a new Matrix, her sole goal was to make life for information criminals (hackers) as horrible as possible. The first line of defense is the Matrix itself. Hosts—at least the ones used by the corporations for their dirty business—are formidably hard to hack. Hosts are typically able to outgun the raw power of invading hackers fairly routinely. Relative to this is the hosts’ ability to launch IC. Gone are the meek programs that merely slow down hackers. Modern IC is as lethal as it is endless. Combating IC is almost folly, as the host has an infinite capacity to spawn more.
虽然这些自动防御非常令人敬畏,许多主机也还会以安保蜘蛛的形式,雇佣(泛)人类安保。其想法是,虽然IC很棒,而且相对来说聪明,它有时候有些容易预料。除了人类大脑之外,还没有真的发明出什么能与之相比的东西(我这里没有算上AI,因为我们能不能,或者该不该有意研发ta们仍然并不清晰)。有时候,大脑的相对混沌可以补足IC死板的逻辑。这些蜘蛛通常有权命令IC,从而应对入侵骇客的策略。
剧透 -   :
While these automated defenses are redoubtable, many hosts will also engage (meta)human protectors in the form of security spiders. The idea is that while IC is excellent and relatively clever, it can sometimes be a little predictable. Nothing has yet been invented that can truly be a match for the human brain save another human brain (I’m not counting AIs here, because it is not entirely clear that we can, or should, intentionally develop them). Sometimes, the relative chaos of a brain can complement the logical rigidity of IC. These spiders usually have the authority to command IC in order to adapt to the strategies of invading hackers.
公司在现实世界中的惩罚性策略有时候会成为虚拟防御的补充。许多公司会尽可能地追踪到入侵者,派现实中的小队在胆敢冒犯的骇客身上开几个孔。这些行为是强有力的威慑,因为许多骇客在矩阵里非常勇敢,但在肉界里面对物理威胁时则完全不然。相比之下,超企对在同时两个舞台显示其致命手段并无问题。
剧透 -   :
A corporations’s punitive strategy in the real world sometimes complements virtual defenses. Many corporations will do their best to trace invaders in order to send physical kick squads to ventilate the offending hackers. This acts as a powerful deterrent, as many hackers will act very brave in the Matrix but are not all that physically intimidating in the meat world. Megacorporations, by contrast, have no problem showing lethality in both arenas.
这些能力已经足够难对付,但德拉马尔做的要更多。主机是围绕文档服务器建立起来的,就像是疣猪战机是围绕火神炮建立起来的一样。简单来说,文档服务器是无法访问的。只有主机的真正所有者可以下命令,把数据从库里取出来。因此,大多数公司把所有数据收起来不动;也就是说,任何没有正被使用的文件都会被收在文档服务器里——除非它被认为并没有特别重要。相似地,如果主机尽全力的防御没能成功阻止入侵者,主机的管理员可以按下一个虚拟的“紧急按钮”之类的,让主机开始把所有数据丢进文档服务器里,从被识别为最重要的数据开始。
剧透 -   :
These abilities are formidable enough, but de la Mar and her cronies did more. Hosts were built around their archive in the same way a Warthog warplane was built around its Vulcan cannon. Archives are, simply put, inaccessible. Only the true owner of the host can command data to be brought out of that vault. Most corporations thus archive all data at rest; that is to say, any file not being immediately used—unless it is deemed not especially important— is locked away in the archive. Similarly, if it looks like the host’s defenses, as mighty as they are, will not succeed in stopping an intruder, the host’s administrators can push a virtual PANICBUTTON of sorts, causing the host to begin throwing all data into the archive, starting with data identified as the most vital.
事实上,骇客仍能通过潜入深层来获得文档服务器里的数据,但大多数公司认为其可能性和古罗马人认为食人族通过阿尔卑斯发动攻击的可能性差不多。显然,顶级的骇客能做到,但大多数骇客除了流血的双眼和错乱的精神之外,得不到什么可以拿来展示他们尝试的东西。公司通常认为这已经足够安全。把数据锁在主机里,而非用线下存储的优势在于,后者可能会物理上地被窃取或受损。文档服务器并非百分百安全,但线下存储也不是。文档服务器在方便使用和有无疑更强的安保方面更具优势。
剧透 -   :
In reality, it turns out hackers can still get at archived data via deep dives, but most corporations consider this possibility in the same way the Romans considered Hannibal’s likelihood of attack via the Alps. Certainly, top-tier hackers can achieve this, but most hackers will have nothing but bleeding eyes and an unhinged mind to show for their attempt. Corporations generally consider this sufficient security. The advantage of locking data in the host, rather than using offline storage, is that offline storage can be physically stolen or damaged. The archive may not be one hundred percent secure, but neither is offline storage. The archive has the edge in ease of use and arguably stronger security.
虽然紧急关闭文档服务器会破坏生意,从而只在紧急情况下实施(记住,有时候,数据失窃可能会比停下所有工作损失更小),它仍然比关闭主机所有连接的最终防护手段的破坏性要小。终极防御措施就是密封主机。因为这会造成所有用户断开连接,所有进程都停滞,它几乎等于关闭了公司。在现实世界中,因为工厂的电力经常与主机相连,整个建筑都可能被关闭,只剩下应急照明和应急程序。这肯定不是会被轻易做出的选择,而公司经常会吞下闯入者在主机中可能造成的损害,也不会完全把它关闭。
剧透 -   :
While an emergency lockdown to the archive is disruptive to business and thus only performed in cases of emergency (remember that sometimes, the theft of data may be less damaging that halting all work), it is less disruptive still than the final protective method of shutting down all connections to the host. The ultimate act of protection is to seal the host. As this causes all users to disconnect and all processes to halt; it is basically the equivalent of shutting down the corporation. In the physical space, as a facility’s power is often tied to the host, the entire building can shut down, leaving only emergency lighting and processes. It is certainly not something done lightly, and corporations will often swallow the damage an intruder can wreak in a host rather than shut it down completely.

引用
巡逻IC PATROL IC
就像在核心书p. 248页所说,巡逻IC通常总是在主机中运行,不断地扫描可疑活动。然而,GM不应该让这意味着巡逻IC会专门堆入侵骇客的每个行动进行矩阵侦察检定。在主机中有时候有数百万个图标,巡逻IC必须把注意力分散到所有这些事情上。
主机越大,就越有需要扫描的东西,而虽然主机的运算能力也有显著的提升,其效率还是有所下降。使用下面的表格来决定巡逻IC多久会对骇客进行一次针对性的矩阵侦察检定。

剧透 -   :
As detailed on p. 248 of Shadowrun, Fifth Edition, Patrol IC is typically always running in a host, constantly scanning for suspicious activity. However, gamemasters should not take this to mean Patrol IC performs targeted Matrix Perception tests against the invading hacker every action is gets. There are sometimes millions of icons in a host, and the Patrol IC must divide its attention among all of these things.
The larger a host, the more there is to scan, and even though the processing power of the host is obviously also greater, there is a degradation in effectiveness. Use the following chart to determine how frequently Patrol IC makes a targeted Matrix Perception Test against the hacker:

主机等级矩阵侦察间隔
1-2每个战斗轮
3-41D6个战斗轮
5-61D6+2个战斗轮
7-82D6个战斗轮
9-102D6+2个战斗轮
11-123D6个战斗轮

巡逻IC可以在安保蜘蛛的命令下改变其行为方式。如果蜘蛛或巡逻IC自己有理由认为有入侵骇客潜伏着,巡逻IC会更加专注,每个动作都进行矩阵侦察。举例来说,如果骇客被发现了,然后成功地进行过一次隐藏动作,巡逻IC会不断地寻找那名骇客。
剧透 -   :
Patrol IC can be commanded by security spiders to behave differently. If a spider, or the Patrol IC itself, has cause to think there is an invading hacker lurking about, the Patrol IC will act far more focused, running Matrix Perception Tests every action. For example, if a hacker is detected and then successfully performs a Hide action, the Patrol IC will certainly be looking specifically for the hacker.
« 上次编辑: 2018-07-19, 周四 17:52:38 由 妖猫 »




离线 妖猫

  • Hero
  • ****
  • 帖子数: 635
  • 苹果币: 3
Re: 【DT】完美主机 THE PERFECT HOST P82-105
« 回帖 #3 于: 2018-05-13, 周日 19:00:24 »
引用
入侵主机一课 A LESSON IN HOST INVASION

Nora扮演的角色Zoe和她的小队翻过了围墙,准备袭击一个研究建筑群。根据他们接的单,Zoe的队友们要在现实世界里地取回约翰逊先生感兴趣的产品样品,而Zoe的任务就是尽可能地从矩阵中支援他们。Nora清楚从外部攻击公司主机无异于自杀,因此她的小队为她找了一个可以直连的终端,而且是主机的从属机。Nora计划着利用主控/从属关系轻易地在设备上获得1个MARK,这会让她在主机上也获得一个MARK。她会从那开始。
剧透 -   :
Nora is playing her character, Zoe, and Zoe and her team have made it over the fence and are ready to hit a research complex. Zoe’s teammates are going in physically to retrieve a sample of the product Mr. Johnson is interested in, as per their orders, and Zoe’s job is to support them as much as possible from the Matrix.Nora knowns that attacking a corporate host from the outside is pretty much suicide, so her team has provided her with a nice, direct connection to a terminal slaved to the host. Nora plans to exploit the master/slave relationship to easily get a mark on the device, which will grant her a mark on the host. She’ll take things from there.
Nora决定要   在热模中操作(所有矩阵动作+2),并且显然,她静默运行(所有动作-2,两部分相互抵消)。因为她直连了设备,并没有杂讯干扰。
她正用的是新星科技·领航员,起始配置是攻击性3,隐匿性6,数据处理4和防火墙5。她的碟板可以运行三个程序;现在运行的是[利用漏洞]、[匿踪器]和[搜索引擎]。她的直觉和逻辑都是5,而破解技能组也是5。

剧透 -   :
Nora decides to operate right away in hot sim (+2 dice to all Matrix actions) and, obviously, she runs silent (–2 to all actions, so the two cancel each other out). As she has a direct connection to the device, there is no noise.
She is using a Novatech Navigator with an initial configuration of Attack 3, Sleaze 6, Data Processing 4 and Firewall 5. Her deck can run three programs; currently she is running Exploit, Stealth, and Browse. Her Intuition and Logic are 5 each, and her Cracking skill group also sits at 5.
Zoe明智地使用了〈后台入侵〉动作,投骇入+逻辑【隐匿性】对抗设备等级+防火墙(这种情况下,是设备等级×2)。终端的设备等级是3,所以Zoe投10个骰子,对抗设备的6个骰子。她获得了3个净成功。她因此能在设备和它的主控机(主机)上打上一个MARK。她对设备本身并没有什么兴趣,因此放弃了由于净成功而获得的提问权利。
因为Zoe现在在主机上有了一个MARK,她用〈进入主机〉动作进去。她给队伍发信息,告诉他们她已经进入主机,开始掩护。此时,GM投骰决定在巡逻IC对她的方向进行扫描之前的战斗轮数。这是个等级8的主机,所以GM骰2D6(根据巡逻IC边栏表格),骰出了10。这意味着Zoe在烦人的巡逻IC试图辨识她之前,她还有些时间。

剧透 -   :
Zoe wisely goes for a Hack on the Fly action, so rolls Hacking + Logic [Sleaze] versus DR + Firewall (which amounts to being DR x 2 in this case). The terminal is DR 3, so Zoe rolls 10 dice against the device’s 6. She gets 3 net hits. She thus gains 1 mark on the device and its master (the host). She isn’t too interested in the device itself, so waives her right to ask for information about it due to her hits.
Since Zoe now has a mark on the host, she uses the Enter Host action to get in. She messages her team that she is in and starts overwatch. At this point, the gamemaster rolls the number of Combat Turns until the Patrol IC fires off a scan in her direction. This is a Rating 8 Host, so the gamemaster rolls 2D6 (as per the Patrol IC sidebar chart) and rolls a 10. That means Zoe has some time before that pesky Patrol IC tries to spot her.
她的小队继续前进,直到遇到了一扇需要打开的门。这扇门从属于主机;鉴于Zoe在主机中,她被视为与所有设备直连,意味着它们不会获得主机的保护。Zoe认为让门打开的最快方法是〈控制设备〉。打开门是个自由动作,所以她必须在门上至少有一个MARK才能这么做。
于是Nora先对门进行了另一次〈后台入侵〉动作。门并没有受到主人的保护,所以这一次还是10个骰子对6个。她再次很快完成,用下一个动作进行〈控制设备〉来打开门,投电子战+直觉【隐匿性】v. 设备等级+防火墙。又一次,她轻松地获得了成功,门随即打开。

剧透 -   :
Her team progresses forward until they meet a door that needs opening. The door is slaved to the host; since Zoe is in the host, she is considered directly connected to all devices, which means they do not get the benefit of the host’s protection. Zoe figures the fastest way to get the door open is to roll Control Device. Opening a door is a Free Action, so she needs at least 1 mark on the door before being able to do that.
Nora thus first makes another Hack on the Fly action against the door. The door is not protected by its master, so this is again a case of 10 dice versus 6. She again makes short work of that, so her next action is to make a Control Device action to open the door, rolling Electronic Warfare + Intuition [Sleaze] v. DR + Firewall. Again, she easily gets the one success she needs, and the door opens.
Zoe和她的队伍继续如此前进,它看上去轻松有效,直到巡逻IC的10个战斗轮期限满为止。GM投主机的16个骰子,并且要求Nora投逻辑+隐匿性。不幸的是,IC获得了3个净成功,发现了Zoe。IC并不喜欢它见到的,于是拉响了警报。由于事态就要急速恶化,GM要求Nora投主动性,而他对主机刚刚启动的探头IC也如法炮制。Nora投出了24,而IC投出了30。
IC全然不知精巧为何物。由于它并没有静默运行,Zoe意识到探头的出现,其外形看上去就像是复盖整个天空的巨大眼球(会自动〈矩阵侦察〉主机中没有静默运行的东西)。探头先动,用主机等级×2(16个骰子)对抗Nora直觉+防火墙的防御骰池(10个骰子)。IC获得了1个净成功,因此主机和所有IC都在Zoe身上有了1个MARK。

剧透 -   :
Zoe and her team continue like this, and all looks pretty well until the ten-Combat-Turn grace period from the Patrol IC expires. So the gamemaster rolls the host’s 16 dice and asks Nora to roll her Logic + Sleaze. Unfortunately, the IC scores 3 net hits and sees Zoe. The IC doesn’t like what it sees, so it sets off the alarm. As things are about to get very bad very quickly, the gamemaster asks Nora to roll her Initiative, while he does the same for the Probe IC the host just launched. Nora rolls 24, while the IC gets 30.
IC is anything but subtle. As it does not run silent, Zoe is aware of the Probe arriving, in the form of a giant eyeball that covers all of the sky (Matrix Perception against anything not running silent in a host is automatic). The Probe goes first, making its Host Rating x 2 attack (16 dice) versus Nora’s defense pool of Intuition + Firewall (10 dice). The IC nets 1 hit, so the host and all of its IC now have 1 mark on Zoe.
Zoe并不真的想和IC战斗。在肉界中,她的队伍需要打开另一扇门——把他们和他们需要偷的样品隔开的最后一扇。于是她用第一个动作对另一扇门进行了〈后台入侵〉,获得了1个MARK。这次她也轻易成功。
在下一个主动性流程中,Probe再次标记了她,获得了另一个MARK。
Zoe对门进行了〈伪造指令〉。虽然概率不高,她失败了。有时候生活就是会这样亏待你。由于她在一次隐匿性动作中失败,门在她身上打了一个MARK。不过,这个MARK并不会分享给门的主控机(主机)。所以门在她身上有了一个MARK——这没什么大不了的。但在这种关头失去一个主动性流程倒是个更大的麻烦。
译注:MARK是化身独享的(其实还有主机,虽然表现出来是IC拥有MARK),并非门这个设备打了一个MARK,而是门的所有者——换言之,很可能是主机。

剧透 -   :
Zoe isn’t even really going to try to fight the IC. In the meat world, her team needs another door opened—the last one before they reach the sample they need to steal. So she spends her first action doing a Hack on the Fly against another door to get a mark. Again, she succeeds easily.
On the next Initiative Pass, the Probe tags her again, gaining another mark.
Zoe for her part performs the Spoof Command against the door. Against all odds, she fails. Sometimes life just gives you the finger like that. Because she failed a Sleaze action, the door gets a mark on her. That mark, however, is not shared with the door’s master (the host). So the door has a mark on her—not really a big deal. But losing an IP at this point in time is a bit of a bigger deal.
On its next action, the Probe nails her with a third mark.
Zoe grimaces and rolls a Spoof Command action on the door again and this time succeeds. Her teammates thank her, telling her to get the frag out of there while she still can. Canny Nora also, at this point, uses a Free Action to switch her Firewall and Sleaze attributes, in preparation for surviving the next IP.

探头用下一个动作在她身上打了第三个MARK。
Zoe痛苦地对门投了〈伪造指令〉,而这次成功了。他的队友们表达了感谢,让她在还来得及的时候赶紧逃出去。狡猾的Nora同时用自由动作交换了防火墙和隐匿性属性,为活过下一个主动性流程做准备。
新的战斗轮开始,以主机派出的新IC抵达战场作为开幕——这是卑鄙又直接的杀手IC。Zoe的主动性是24,而杀手IC是36.杀手IC先动,竭尽其能给她来了超狠的一击。它还是投16个骰子,而Zoe骰直觉+防火墙的10个骰子。不过,Nora觉得现在被变砖并不好。她选择进行〈矩阵全防御〉。GM从她的主动性值中减去10,但她把意志加进了防御骰池。在投骰结果出来之前,所有人都屏息以待。GM获得了少得可怜的2个成功,而Nora投出了6个。这并不能完全弥补她糟糕的〈伪造指令〉投骰结果,但起码像样。
译注:这就忘记了之前换属性了吗……防火墙应该是6,全防之前是11dp才对。

剧透 -   :
A new Combat Turn begins and is inaugurated with the arrival of a new IC spawned from the host—some dirty and direct Killer IC. Zoe again gets 24 on her Initiative roll, and the Killer IC gets 36. The Killer IC goes first, doing what it does best and giving her a really hard slap. It rolls the usual 16 dice while Zoe rolls her 10 dice from Intuition + Firewall. However, Nora decides that getting bricked right now would not be very good. She opts for a Full Matrix Defense. The gamemaster removes 10 from her Initiative score, but she adds Willpower to her dice roll. Between the boosted Firewall and her Willpower, Nora is now rolling 15 dice in defense. Everyone holds their breath as the roll-off occurs. The gamemaster gets a measly 2 hits while Nora rolls 6. Doesn’t entirely make up for her terrible Spoof Command roll, but it’s something.
在她的下一个动作里,Nora立刻用简单动作切入AR,随即进行了一次〈弹出〉动作。理论上说,Zoe还能潜回去做些别的骇入,不过系统现在是高度警报状态,主动寻找任何入侵者。鉴于此,她决定重新加入队伍,这时候把她的柯尔特·眼镜蛇的火力加到最大,或许能更好地利用她的时间。
剧透 -   :
On her next action, Nora immediately uses a Simple Action to drop to AR and then performs a Jack Out action. Theoretically, Zoe could log back to do some more hacking, though the system will be on high alert and actively looking for any further intruders. Given that, she figures joining back up with the team, and lending her Colt Cobra’s firepower to the mix might be a better use of her time right now.
« 上次编辑: 2018-05-25, 周五 18:28:56 由 妖猫 »




离线 妖猫

  • Hero
  • ****
  • 帖子数: 635
  • 苹果币: 3
Re: 【DT】完美主机 THE PERFECT HOST P82-105
« 回帖 #4 于: 2018-05-25, 周五 18:25:58 »
主机与产业 HOSTS AND INDUSTRIES

就像之前说的,塑模主机是个很赚钱的行当,但也竞争激烈。虽然新协议允许溯及大多数已存的主机,任何把竞争力当回事的公司(也就是没有主动申请破产的那些)都很快开始利用新矩阵的力量,重新设计其主机。这个行业发展迅速(顺便,挖角的时机已经成熟——如果你要活干,联系我),但赢家则是那些卖出的特殊产品能为特殊商业部门量身定制的。我要说一说公司经营的一些主要商业领域,不过别把这当做一个全面无遗的列表。理解他们的生意能帮你理解你对付的是什么,还有为什么。
剧透 -   :
As explained earlier, sculpting hosts is a lucrative business, but it’s also a competitive one. While the new protocols allowed most existing hosts to be grandfathered over into the new Matrix paradigm, any corporation that valued competitiveness (i.e., everyone not actively filing bankruptcy) quickly started moving forward to redesign their hosts to take advantage of the new Matrix’s power. It’s a booming business (which, by the way, is extremely ripe for extraction jobs—call me if you need work), but the clear winners are those able to deliver specialized products tailored to specific business sectors. Don’t consider this a wholly exhaustive list, but I’m now going to cover some of the major business areas corporations operate in. Understanding their business will help you understand what you’re up against and why.


公共部门 PUBLIC SECTOR

我们就从这个特别的东西开始。哈啊,公共部门。如果对你来说,“公共部门”意味着对公司的钱着了迷的傀儡政权,是珍视官僚主义和低效的最后堡垒,你并不完全错误。不过,事实是,即便是私有部门有时也实际上是公共部门。有点混乱?我解释一下。大多数政府,从市级到国家,都把大量的服务外包给了私有企业。西雅图(还有很多其他的)与像是游侠这种私人机构在警务方面有契约,但从维护水管到垃圾收集的大事小事都由私人公司掌握。这不仅造成了巨大的民主不公,还很大程度上在当选的官员和他们监督的服务间创造了一层隔膜,而在计算机系统方面,每个人都在可笑地假装服务很透明。所有承包人都在公共契约下行事,被迫忍受无穷的繁文缛节,服从山一样多的规矩,还得提交无尽的审计报告。在实践中,所有人都会在这些事上撒谎,而且几乎从不去注意,但事实上每个人仍然得参与到其中。主机设置的特别方式就是为了满足所有的规矩,同时输出特定的审计数据。另外,政府(或者更准确来说,有正确联系的政客和官僚们)基本上通过不断地改变承包商必须遵循的规范,赚了成吨的钱。这需要运行公共部门的企业永远在系统里留有主机程序员和顾问,努力进行调整来遵守政策。
剧透 -   :
Starting off with a doozy right there. Ah, the public sector. If to your ears “public sector” means puppet regimes enthralled by corporate money that serve as last bastion of enshrined bureaucracy and inefficiency, you’re not wholly wrong. However, the truth is that even the private sector is sometimes actually a public sector. Confused? Allow me to explain. Most governments, from municipal to national, outsource the bulk of their services to private companies. Seattle (and many others) have contracts with private outfits like Knight Errant for policing, but everything from maintenance of water pipes to trash collection is handled by private companies. While, for the most part and to great democratic injustice, this creates a layer of obscurity between elected officials and the services they oversee, in computer system terms, everyone still plays a ridiculous game of pretend-transparency. Just about all contractors acting under public contracts are forced to endure ridiculous amounts of red tape, comply with mountains of regulations, and submit endless audit reports. In practice, everyone lies on these and almost no one pays attention, but the fact is that everyone still has to play the game. Hosts thus have to be set up in very specific ways in order to meet all the regulations while outputting very specific audit data. In addition, governments (or, more accurately, politicians and bureaucrats with the right connections) essentially make a ton of money by constantly changing the norms contractors have to adhere to. This requires companies working the public sector to constantly have host programmers and consultants in their systems, working to change things to make compliance.
总的来说,任何经营公共部门的企业主机实际上会在核心业务的效率上有所削减,从而特化其系统,在公共部门的疯狂中活下来。有些公司可能会固执地试图设置两个主机,一个用于管理数据,满足政策需要,而另一个更专业的主机用于主要进程。不过,数据必须不断地在主机间沟通流动,所以这通常会降低总体计划的效率。
剧透 -   :
All in all, hosts for any sort of corporation working the public sector will actually have to take an efficiency hit on their core business in order to specialize their system to survive the public sector’s insanity. Some corporations may stubbornly try to maintain two hosts—one for administrative data to meet compliance, and the other running a more specialized host for their main processes. Data must constantly flow between these hosts, though, so that generally reduces the efficiency of the overall setup.

引用
西雅图都市群行政主机
THE SEATTLE METROPLEX ADMINISTRATION HOST


西雅图一直有一个大主机,以供所有的行政需求。虽然每个组成都市群的自治区(贝尔维尤、塔科马等等)都有自己的(更小的)主机,大西雅图主机(Seattle Metro’s)是最大的,包括了某些有关每个组成部分的数据。
剧透 -   :
The city of Seattle maintains a large host for all of its administrative needs. While each of the municipalities that make up the ’plex (Bellevue, Tacoma, etc.) maintains its own (smaller) host, Seattle Metro’s is the largest and contains some data concerning each of its constituent parts.
西雅图主机最近花了大价钱重新设计,遵循对新矩阵协议的调整适应。就像过气的老顽固,西雅图仍然保持着它曾经翡翠城的名号(作为名字灵感来源的绿化很早以前就已铺设)。他们不知道该如何提醒这个世界自己曾经代表什么,便只好把新主机的虚拟现实塑模为真的翡翠做成的城市的样子。庞大的绿色水晶建筑漂浮在蔚蓝色的天空中,光芒闪耀在精致雕刻的建筑的许多表面上。金与乌木装饰着金字塔外形的边缘,而精致的阿拉伯图案装饰着原石的表面。
剧透 -   :
Seattle’s host was freshly redesigned at great expense following the adoption of the new Matrix protocols. Like a crusty old has-been, Seattle just keeps hanging on to its onceappellation of Emerald City (the greenery inspiring the name having long ago been paved over). Having found no better way to remind the world that they used to stand for something, their new host’s virtual reality is sculpted in the image of a city made of actual emeralds. Large green crystalline structures float in an azure sky, light glinting off the multiple facets of the exquisitely carved structures. Gold and ebony line the edges of the pyramidal shapes, while delicate arabesques decorate the surface of the raw gemstones.
主机与物理无涉,所以用户和访客都能随意漂浮。水晶建筑基本上对应着西雅图都市群行政机关的不同部门,而且实在有很多部门——HR(人力资源)、资产管理、采购、IT(信息技术)、财政、能源管理……很多很多。每颗翡翠的内部空间都像是典型办公楼的内部,除了几乎所有东西都由金、象牙、黑大理石和翡翠制成,雇员们会登入这里并且做他们的工作(如果他们那天想做的话)。非常棒。随着烦人的物理法则被歪曲,环境塑模了无比精致的家具。无比薄的骨架上生长出成千上万的宝石花瓣,让它形成工作桌和会议桌。很久之前就已经了解到完全忽视物理对矩阵用户是有害的,所以宝石家具实际上是可以破坏的,虽然它比看上去要结实很多。但如果用户真的去试,家具会粉碎掉。这在入侵者骇入的时候经常发生,因为他们会绕过普通的过程,损坏代码。
剧透 -   :
The host has no concern for physics, so users and visitors float around as they wish. The crystal structures are essentially for different departments within the Seattle Metroplex Administration, and there are many departments—HR, Asset Management, Procurement, IT, Finance, Energy Management … the list goes on. The space inside each emerald, where employees log in and do their work (if they feel like it that day) is like the interior of a typical office building, except almost everything is made of gold, ivory, black marble, and emeralds. Very fancy. With pesky laws of physics bent, the environment sculpts incredibly delicate furniture. Incredibly thin armatures sprout thousands of little gemstone petals and leaves that form work desks and meeting tables. Completely ignoring physics has long ago been understood to be detrimental to Matrix users, so the gemstone furniture actually is breakable, though it is far more robust than it looks like. But if a user really tries, the furniture can be shattered. This happens a lot when intruders are hacking in, bypassing normal processes and corrupting code.
西雅图的主要主机里如果没有挤着数据,也就没有什么了。主题回避了数据的物理表现,相反,文件是跳动着的蓝色光点,在被访问时才拓展为漂浮着的数据显示。全息数据呈现为黄色边缘的绿松石,看上去和主机的一片绿色十分相称。
希望见到《绿野仙踪》里芒奇金人或飞猴样子IC的入侵者可要失望了。西雅图的IC样子像是液态金属球,像是水银。在它们遭遇到闯入者的时候,球体会改变形状,射出由它们镜子一样物质构成的锋利刀刃。

剧透 -   :
Seattle’s main host is nothing if not bloated with data. The theme eschews physical representations of data. Instead, files are pulsating little dots of blue light that, when accessed, expand into floating displays of data. The turquoise holo data, framed in yellow borders, looks very nice against the general greenery of the host.
Intruders hoping to see IC manifest as munchkins or winged monkeys from The Wizard of Oz will be disappointed. Seattle’s IC manifests as spherical balls of liquid metal, like mercury. The balls reshape as they engage intruders, shooting out razor-pointed blades of their mirror-like substance.

主机等级:7
通常配置:攻击性8,隐匿性7,数据处理10,防火墙9

安保流程:巡逻IC随时运行。一个次级安保专家随时巡逻。一旦警报响起,主机会依照以下顺序放出IC:探头、扰乱、蚀甲、木马、干扰、记号笔和追踪。如果其中一个IC被砖化,它会用下一个战斗轮重启那个IC,而不是继续到下一个。
通常来说,主机只会用“白”IC,试图尽快瓦解掉入侵者,但不对使用者或他们的设备造成伤害。原因很简单,就是因为城市里有很多年轻的朋克脚本小子,只会努力制造麻烦,而且市里的法律部门也厌倦了处理愤怒的家长或其他社会活动团体的法律诉讼。所以城市的安保成员已经习惯了得当且轻柔地把任何入侵者踢出去。

剧透 -   :
Security Procedure: Patrol IC running at all times. One Junior Security Specialist patrolling at all times. Once alarmed, the Host will launch IC in this order: Probe, Scramble, Acid, Binder, Jammer, Marker, and Track. If one of its IC gets bricked, it will use the next Combat Turn to reboot that IC rather than moving on to the next one.
In general, the host will only use “white” IC that seek to crash intruders as quickly as possible but do no damage to users or their equipment. The reason is simply that the city gets a lot of young punk script kiddies doing their best to cause trouble, and the city’s legal department has gotten tired of settling lawsuits from angry parents and other activist groups. So the city’s security staff is resigned to booting any intruders expediently but gently.
用途:访问西雅图主机可以获得任何市里雇员或被选举官员的信息。由于大多数服务外包给个人,但由官僚们调节,市里同样保留着关于所有给城市供给货物或服务的公司的相当一部分信息。市里还有许多公共基础设施的蓝图或图表、注册和许可信息等等。通常来说,这是可能目标的间接信息的重要来源。
剧透 -   :
Uses: The Seattle host can be accessed to obtain information on any city employee or elected official. Since most services are privately outsourced but regulated by bureaucrats, the city also keeps quite a bit of information about all corporations that supply the city with goods or services. The city also maintains many blueprints and schematics of public infrastructure, registrations and permit information, and so forth. In general, it is a great source of indirect information on possible targets.

服务 SERVICES

服务部门包括了许多生意。基于服务的组织可能意味着某种咨询公司(随便选个词,然后加一个“咨询”,你就能找到提供服务的公司),也可能是特定顾客的支持公司或市场营销公司。该死,卖淫也是服务。任何提供人的天分和/或脑力(通常是小时计)而非出售实际产品的公司就是在经营服务行业。
剧透 -   :
The services sector covers a very wide range of businesses. A service-based organization can mean anything from any sort of consultation company (pick any word and add “consultant” to it, and you’ll find a firm offering those services) to specialized customer support firms or marketing firms. Hell, prostitution is a service, too. Any firm that offers people’s talents and/ or brainpower for hire (usually by the hour) rather than selling an actual product is in the services business.
显然,这样宽泛的定义只会让你找到在主机中寻找各式各样东西的不同的人。有时候你会找到关心处理大量数据的公司(比如市场营销公司在零售记录中挖数据矿),而其他时候,主要焦点是安保,比如一些顾问由于其工作的必要性,结果掌握了许多客户的敏感信息。
剧透 -   :
Obviously, with such a broad definition, you’re going to get people who look for different things in a host. Sometimes you’ll get companies that care about crunching a lot of data (such as marketing firms data-mining retail records), while other times security will be the main focus, such as with consultancies that, through the necessity of their work, end up holding a lot of their clients’ sensitive information.
服务组织普遍回需要经营更小、更紧密的主机,特别为管理个人契约而进行优化。毕竟这些类型的公司的生死存亡取决于他们能把资源利用得有多好。因为专业的知识是稀有品,有些服务公司会给它们的雇员付许多薪水。所以,如果有个价高的混蛋闲待着,却不把他的服务卖给别的公司,这会是对公司利润的致命伤害。这意味着主机倾向于用来建模和预计工作量,确保公司能够进行非常精准的承诺,把他们的人力发挥到最大。考虑到生意的善变本质,再加上同样善变又难以预料的人类本质,这可不是容易事。
剧透 -   :
Service organizations will generally need to run smaller, tighter hosts optimized specifically to help them manage their personnel engagements. After all, these types of firms live or die based on how well they can utilize their resources. Since specialized knowledge is a rarity, some service firms pay their employees a lot of money, so having a high-priced asshole sitting on a bench and not selling his services to another corporation means a deadly drain on the company’s bottom line. That means hosts tend to be used to model and predict workloads, ensuring corporations are able to make very precise promises, using their people exactly to capacity. Considering the fickle nature of business and the equally fickle and unpredictable nature of human beings, this is no easy feat.

引用
桃子香槟俱乐部文乐人偶剧院,亚马逊国大都会(圣保罗区)
PEACH CHAMPAGNE CLUB BUNRAKU PARLOUR, METROPOLE (SÃO PAULO DISTRICT), AMAZONIA


驹田会(Komata-Kai)宣称整个亚马逊国都是他们的地盘,但他们的大本营在广袤的大都会超级蔓城的圣保罗区。圣保罗是大量日本人的家乡(这里是日本本土外最大的一块日本公民飞地),而且这里有一切让日本人感觉正在家乡的东西,托驹田会的福,还包括能满足人更黑暗的恶习的东西。
剧透 -   :
The Komata-Kai gumi claims all of Amazonia as their territory, but their stronghold is in the São Paulo district of the vast Metropole megasprawl. Home to a large population of Japanese (indeed, the largest enclave of Japanese citizens outside of Japan itself), São Paulo has everything the Japanese need to feel right at home, including catering for man’s darker vices, courtesy of the Komata-Kai.
虽然大都会当局并非容易打败的对手,但他们也深知让地下力量集中在有组织的极道手中,避免落入大群白痴耶胡手上的有用之处。这意味着,就像他们几个世纪以来做的一样,极道(暴力地)帮助维持街头的和平,并且作为其交换,没人会打扰他们贩卖恶习的巢穴。
剧透 -   :
While the Metropole authorities are no pushovers, they also understand the usefulness of having underground power concentrated in the organized hands of Yakuza rather than hordes of idiotic yahoos. This means that, as they have done for centuries, the Yakuza (brutally) help keep the peace in the streets, and in exchange nobody bothers their vice dens.
桃子香槟俱乐部是极道在亚马逊国,甚至可能是在全世界最大的文乐馆。这一俱乐部在现实中占据了一栋豪华闹市区建筑中的十六层。极道在俱乐部中营造出富足、安全、奢华的气氛,但在人偶剧院许多紧闭的房门后面进行的事情可绝称不上文明。
剧透 -   :
The Peach Champagne Club is the Yakuza’s biggest bunraku operation in Amazonia, and quite possibly the world. The club is physically spread over sixteen floors of a posh downtown building. The Yakuza maintain a rich, safe, luxurious atmosphere in the club, but what goes on behind the closed doors of the puppet parlor’s many rooms is far from civilized.
极道保持这个主机是为了控制俱乐部的经营。主机用于管理俱乐部的鸡尾酒吧(计算和管理其销售和酒精供应),还有出现的实际卖淫。卖淫者是安排好且登记过的。这一俱乐部“雇佣”(无论是否自愿)了超过150名卖淫者,而且有很高的周转率(也就是说,卖淫者被客户杀害或无法恢复地破坏了、失去神志到了变为无用的程度、自杀了、逃跑了等等)。最好地安排卖淫者需要许多安排。另外,主机存储了一大个数据银行的人格,可以盖印(imprint)在文乐卖淫者头脑中,还有足够的容量供所有这些人格修正同时且无缝运行。
剧透 -   :
The Yakuza maintain a host dedicated to the control of the club’s operations. The host is used to manage the club’s cocktail lounge—the accounting and management of its sales and liquor supply—as well as the actual prostitution that occurs. Prostitutes are scheduled and booked. The club “employs” (willingly or not) over one hundred and fifty prostitutes, with a very high turnover rate (i.e., the prostitutes get killed or irreparably wrecked by clients, lose their minds to the point of becoming useless, commit suicide, escape, and so forth). Optimally scheduling the prostitutes requires a lot of organization. In addition, the host stores the large databank of personalities the bunraku prostitutes can be imprinted with, along with sufficient capacity for simultaneous and seamless streaming of all of these personafixes.
当然,在所有这些之上,驹田会还提供虚拟访问。主机被设置为运行实时的拟感流,允许访问的主顾实时与卖淫者性交(或者别的什么)。它和某些最梦幻的色情拟感程序没法比,但仍有市场,能吸引客观的一部分客户。对那些具有窥视倾向的,主机也提供正享受商品顾客的实时摄像反馈。巧妙的算法隐去正在享受的顾客(但不会隐去卖淫者)。物理安保同样使用系统中保留的位置监控整栋建筑。
剧透 -   :
Of course, on top of all that, the Komata-Kai also offer virtual access. The host is set up to run a form of live, streaming simsense that allows visiting patrons to have sex (or whatever) with the prostitutes in real-time. It can’t compete with some of the fantastic pornographic simsense programs out there, but it’s still a market that attracts a sizeable portion of clients. For those with a voyeuristic tendency, the host also offers live camera feeds of patrons enjoying the wares. Clever algorithms anonymize the patrons enjoying themselves (but not the prostitutes). Physical security also uses reserved locations within the system to monitor the premises.
视觉上看,主机的VR非常像阴道(许多直女客户已经控诉多次,但这没有带来任何改变)。红色和粉色是主要颜色,而虚拟房间柔软地垫上了绒面、软皮和悬挂的帷幔创造出的多层窗帘。家具配饰被重重地漆成了有光泽的样子。这一点都不巧妙。虚拟空间非常大,像是巨大的宅邸。灯光昏暗,空气中交织着鸦片、香草、佛手柑和香根草的浓厚气味。由于这些人在主机中进行的行为的本质,有相当多的部分访客使用热模装置登入,而极道把这点利用为优势,把虚拟空气中的气味和代码都设计得极其令人成瘾。
剧透 -   :
Visually, the host’s VR is extremely vaginal (several straight female clients have complained, but that has not resulted in any change). Reds and pinks dominate the palette, while the virtual rooms are softly padded with plush, soft leather, and hanging drapery creates layers of curtains. Furniture accessories are heavily lacquered for a glossy look. Subtle it is not. The virtual space is very large, like an enormous mansion. Lighting is dim and the air is laced with the heavy scent of opium, vanilla, bergamot, and vetiver. Due to the nature of the activities one performs in the host, a sizable portion of visitors use hot-sim rigs for access, a fact the Yakuza exploit to full advantage by scenting the virtual air with code designed to be especially addictive.
驹田会对其主机的首要安保目标是不让脚本小子免费进来。不过,他们的确有财务信息,还有(根据流言)用于勒索某些值得注意的顾客的数据,所以安保应对很快就会变得非常致命。毕竟,极道并不需要担心他们应对的合法性,只需要在意它的效率如何。
剧透 -   :
The Komatas’ primary security concern with regard to their host is keeping out script kiddies trying to get in for free. They do have financial information in there, however, as well as (according to rumor) blackmail data on some notable patrons, so the security response quickly turns deadly. After all, the Yakuza are not here to worry about the legality of their response, only its effectiveness.

主机等级:5
通常配置:攻击性6,隐匿性5,数据处理7,防火墙8
安保流程:巡逻IC随时运行。一个标准安保蜘蛛随时巡逻。一旦警报响起,主机会依照以下顺序放出IC:探头、黑IC、电椅、杀手和追踪。如果其中一个IC被砖化,它会用下一个战斗轮重启那个IC,而不是继续到下一个。
如果侵入者嘲弄其防御,主机会叫来一名安保处理专家。这位重火力会在警报响起后2D6个战斗轮内到达,如果粗心的骇客仍然在附近的话。

剧透 -   :
Security Procedure: Patrol IC running at all times. One Standard Security Spider patrolling at all times. Once alarmed, the host launches IC in this order: Probe, Black IC, Sparky, Killer, and Track. If one of its IC gets bricked, it will use the next Combat Turn to reboot that IC rather than moving on to the next one.
If the invader is making a mockery of its defenses, the host will bring in a Security Troubleshooter. This heavy gun will arrive 2D6 Combat Turns after the alarm has been sounded, should the careless hacker still be around.
用途:桃子香槟俱乐部主机可以作为狂奔者和约翰逊之间会面的地方,特别是驹田会的约翰逊。狂奔者偶尔会被女儿失踪的家庭雇佣,进入系统查看雇员记录(这些工作通常带有撤出的要求)。聪明的狂奔者也会骇入系统安排特定的会面,入侵安保系统支持物理闯入。然后,这里永远会有勒索材料的流言……
剧透 -   :
Uses: The Peach Champagne Club Host may serve as a meeting place between runners and Johnsons, especially Komata-Kai Johnsons. Shadowrunners are occasionally hired by families of missing girls to get into the system and check the employee registry (these assignments are often followed by extraction requests). Clever runners can also hack the system to arrange specific meetings and invade the security system in support of physical intrusions. Then there are always those rumors of blackmail material …
« 上次编辑: 2018-06-06, 周三 10:14:24 由 妖猫 »




离线 妖猫

  • Hero
  • ****
  • 帖子数: 635
  • 苹果币: 3
Re: 【DT】完美主机 THE PERFECT HOST P82-105
« 回帖 #5 于: 2018-05-30, 周三 15:46:02 »
矿业、伐木业和农业 MINING, LOGGING, AND AGRICULTURE

这些东西你们从来不会想到,但第一产业产值数万亿,却令人担心地集中在区区几名玩家手里。资源收获的数量之巨是非行内人难以理解的。如今几乎整个操作都是自动化的,众多的大型无人机日夜无休地工作,从自然母亲身上尽其所能地撕扯掠夺。
剧透 -   :
These are the guys you never think about, but the primary sector is a multi-trillion-nuyen industry worryingly concentrated in the hands of just a few players. Resource harvesting occurs on scales that the non-initiated could scarcely comprehend. Almost the entirety of operations are automated nowadays, with legions of huge drones working nonstop, day and night, to rip as much as they can out of Mother Nature.
因此,操作经营依赖于强大又关键的主机系统,接收无人机和自动系统的实时感觉输入,而后勤办公那些东西(计算和其他无聊的活)的量也吓人地多。商品在国际市场上的价格沉沉浮浮,所以追踪当地市场每分钟的价格波动和整体综合指数十分关键。由于流程的自动化,无人机和机器可以以分钟为单位调节收获产出,以匹配供需。由于整个全球系统都相似地相互勾连,鉴于供应永远被配置为符合需求,你可能会推测价格应当保持不变(如果你倾向于宏观经济学)。这可能会成真,如果供需没有被人为操作来符合某些目的的话。由于几乎所有第一产业活动都集中在非常多元化的超企手中,竞争对手可以用有很多办法来操控市场形势样貌,从而让竞争者错误估计真实需求,由此过度或过少供应——两者都意味着那家公司损失了利益。
剧透 -   :
Operations thus rely on very powerful and critical host systems that accept real-time sensorial input from these drones and automated systems, while the back-office stuff—all the accounting and other boring stuff—is also on a frighteningly large scale. Commodities live and die on the price of the international markets, so keeping track of minute price fluctuations in local markets and overall composite indexes is essential. Due to the automation of the processes, drones and machinery can be minutely altered to reduce harvesting output, in order to match supply with demand. As the entire global system is similarly hooked in, you might theorize (if you’re inclined to macroeconomics) that prices should be constant, as supply is always configured to match demand. That would be true were it not for the fact that demand and supply can be artificially manipulated to suit agendas. As almost all primary sector activity is concentrated in the hands of vastly diversified megacorporations, there are all kinds of ways in which rivals can attempt to manipulate the outlook of the market to trick the competition into incorrectly gauging real demand and thus over or under supplying—both of which means the other corporation just lost money.
这样的价格战是行业现状,而这一行业依赖的主机建立于更复杂的市场分析算法之上,用来区分价格攻击和真实需求。这很大程度上依赖于基于历史潮流推算需求的预计算法。这些模型当然仍然还是过于简单,所以会投入来自于商业智能的数据。签署了新交易、生意被收购或者萧条、政治不稳定——所有这些都会通过不同的输入进行解释。来自社会经济智能的数以千计的信息流投入其中,全为了预计市场价格小数点后好几位的波动。
剧透 -   :
Such price wars are the status quo of the industry, and the hosts this industry rely on are built with ever more sophisticated market analysis algorithms to differentiate pricing attacks from real demand. Much of this relies on predictive algorithms that extrapolate demand based on historical trends. These models would still be far too simplistic of course, so the algorithms are fed data from business intelligence sources. New deals being signed, businesses being acquired or going bust, political instability— all this is accounted for through different input. Thousands of streaming sources of socio-economical intelligence are fed in, all to predict the fluctuation of market prices by a few fractions of a nuyen.
产业作为一个整体,不会搅和进严肃的电子战争。企业法庭紧紧地监视第一产业,采取措施,禁止它们对其他主机进行重大攻击。供需之间的平衡实在太过微妙,误导一方进行重大供应调整的一次攻击,在最好的情况下也会导致大规模衰退,而在最差的情况下,会导致饥荒,毁灭人类。让你晚上睡不着的一点可爱的小想法:我们可能会因为某些农业企业试图在每千克大豆的成本上减去0.0001新円而死去。
剧透 -   :
One thing that the industry as a whole does not mess with is serious cyber warfare. Closely monitored and enforced by the Corporate Court, primary sector corporations are proscribed from unleashing major attacks on one another’s hosts. With the line between supply and demand kept so razor-thin, a serious attack tricking a party into major supply changes could at best cause a massive recession, and at worst destroy humanity with starvation. Lovely thought to keep you up at night: We could all die because some agricorp was trying to shave 0.0001 nuyen from the cost of a kilo of soy.
矿业、伐木业和农业,所有这些产业都倾向于拥有多个相连的主机,单纯是因为他们的核心主机有着其他公司没有的掠夺性的特殊需求。不过,许多公司会忍痛把所有东西集中在一个主机里,促使数据紧密地一体化,让整个公司有更快的实时决策。
剧透 -   :
Of all the industries, mining, logging, and agriculture are the most likely to have multi-host hookups, simply because their core business hosts have such rapacious and specialized requirements that the rest of the corporation does not share. However, many corps just bite the bullet and host everything at the same place, leveraging tight data integration for faster real-time decision-making across the entire company.

引用
跨洋矿业主机 TRANS-OCEANIC MINING HOST

跨洋矿业是近海采矿业中少数几个大玩家之一,采矿钻机设置在北海、东南亚,还有阿萨巴斯卡理事会的海域。公司已被大股东瓜分多年,最大的一块握在赛达尔-克虏伯手里。
考虑到理事会里充满内讧股东和敌对气氛,跨洋选择了在两个主机中操作。它的主要采矿主机和它的财务管理主机分开,从而将财务报告所招致的政治斗争与正常经营隔绝开来。

剧透 -   :
Trans-Oceanic Mining is one of several large players in the offshore mining business, with mining rigs deployed in the North Sea, around Southeast Asia, and in Athabaskan Council waters. The corporation has been divided among major shareholders for many years now, with Saeder-Krupp owning the largest part.
Given the hostile climate in the boardroom from the infighting owners, Trans-Oceanic has chosen to operate with two hosts. Its main mining host is separated from its financial and administration host, thus isolating operations from the politicking that can come from financial reporting.
矿业主机的虚拟现实是由经典的斯堪的纳维亚设计美学塑造而成的,以干净简洁的线条、极简主义和清爽澄澈的颜色为特征。主机看上去有点像是坐落在瑞典雄伟峡湾中的小屋。这一空间是由一些巨大的立方体建筑构成的,它们由铬和玻璃制成,带着红色橙色的装饰。完美切割出的玻璃环绕着设施,蜷在锯齿状的岩壁上,俯瞰着钴河,构成了这完美无暇的风景。
剧透 -   :
The mining host’s virtual reality is informed by classical Scandinavian design aesthetics, featuring clean lines, minimalism, and crisp, clear colors. The host looks a little like a cottage nestled in the majestic fjords of Sweden. The space consists of a few large cubic constructs of chrome and glass, with red and orange accents. An immaculate landscape of perfectly cut grass surrounds the facility, tucked on a cliff of jagged stones overlooking rivers of cobalt.
这里的空气有着舒适的湿度,氧气含量很高,像是在寒冷多雾的北方森林之中。访客可以到外面,到立方体建筑之间走走,这里几乎完全遵循着现实的物理法则。而在巨大的立方体建筑中,物理就变得不稳固了。上与下的概念变得非常埃舍尔风格。访客可以转弯走进走廊,却突然发现自己正踏在上面的地板像是刚才走过地方的墙。全白的,由铬和玻璃构成的立方体内部没有边界。远远看上去,它们都是一样的,使得在里面寻找方向十分困难。门几乎是无从发觉的,只有在它们被轻轻推开的时候,通过勾画出门框的细槽才能找到它们。
剧透 -   :
The air feels overly oxygenated with a pleasant humidity to it, like in a cold, misty boreal forest. Visitors can walk outside between the cubic structures, almost fully respecting the laws of physics. Inside the large cubic buildings, physics get wonky. The concept of up or down becomes very Escher-esque. Visitors can turn a corridor and suddenly find themselves walking on what seemed like wall a moment ago, but is now the floor. The interior of the cubes—all white, chrome and glass—lacks borders. It all looks uniform from afar, making navigation very difficult. Doors are almost imperceptible—thin gaps delineating the frames are the only way to spot them, as they open with a gentle push.
这些立方体处理跨洋经营的不同采矿钻机的数据和功能。更简单的处理过程放在建筑外面。向中心走,会见到越来越多的活动,一直到立方体的中心,那里有着名副其实的数据漩涡。就在用户逐渐向中心移动的时候,耳朵周围的空气会首先开始缓慢地流动起风。这一轻柔的风会逐渐变成一阵激流,最终在靠近核心处理单元的数据处理漩涡的地方,变为震耳欲聋的咆哮。
虽然所有化身都以人的样子出现,所有的安保措施都呈现为罗特韦尔犬,在冰冷无情的走廊里追逐入侵者。

剧透 -   :
The cubes process the data and functionality of the various mining rigs operated by Trans-Oceanic. Simpler processing occurs toward the outside of the structures. Moving toward the center reveals more and more activity, until the center of the cube is reached and a veritable maelstrom of data is discovered. As users move progressively toward the center, the air around their ears at first starts blowing gently. That gentle blow grows into a rush and then finally a deafening roar near the data processing vortex of the central processing unit.
While all personas appear as people, all security measures render as Rottweilers, chasing down intruders in the clinical hallways.
第二个主机(管理用的那个)的塑模非常不同。或许是受到理事会大戏的启发,主机呈现为黑白两色。它并没有灰度,只有纯黑和纯白,不过聪颖的艺术家试图用这两者将一切东西表现为一种令人信服的形态。这个地方看上去是一个办公楼,20世纪中期的风格混搭上现代会议室。管理人员就在这些虚拟的小房间中工作,连续不断地抽香烟,喝焦咖啡,而老板在虚拟会议室中进行他们的权力游戏。由于里面所有东西都是纯黑纯白,它会给大多数头几次进来的访客留下有趣的经验。
剧透 -   :
The second host, the administrative one, is modeled very differently. Perhaps inspired by the boardroom drama, the host renders in black and white. Not greyscale—pure white and pure black only, though very clever artistic use of the two manages to render a surprisingly cogent, if entirely dramatic, form to all things. The location appears to be an office building with mid-twentieth-century sensibilities mixed with modern boardrooms. The administrative staff works in these virtual cubicles, chain-smoking cigarettes and drinking burnt coffee, while the bosses play their power games in the virtual meeting rooms. With everything in purely black and white, it makes for an interesting experience that leaves most visitors on edge the first few times.
安保人员以影子的形式出现,只在黑色的地方移动。他们会扭曲身边的光线,仅仅表现出一瞬的穿着短大衣和浅顶软呢帽的人影。不过,他们的脸完全没有形状,除了眼睛位置有两个陷下去的黑洞。感觉到安保措施怒火和受到伤害的闯入者会乐于看到自己的图标溢出明亮而光滑的深红虚拟血液——这是整个现实中唯一的颜色。
剧透 -   :
Security appears as shadows, bare movements of black on black. They bend the light around them, offering only rare glimpses of human forms in trench coats and fedoras. Their faces, however, are completely shapeless, except for sunken pools of darkness for eyes. Intruders who feel the wrath of the security measures and take damage will have pleasure of seeing their icons spill virtual blood as bright, slick crimson—it’s the only color in the entire reality.

经营主机 OPERATIONS HOST

主机等级:10
通常配置:攻击性10,隐匿性11,数据处理13,防火墙12
安保流程:巡逻IC随时运行。一旦警报响起,主机会依照以下顺序放出IC:杀手、记号笔、扰乱、蚀甲、干扰、冲击波、木马、崩溃、电椅和黑IC。如果其中一个IC被砖化,它会在重启任何IC之前沿着顺序继续下去。
如果入侵者转化了一只IC,或者警报声持续了4个战斗轮,两个安保处理专家会登入系统来把入侵者踢出去(或者更好的,把他杀掉)。

剧透 -   :
Security Procedure: Patrol IC running at all times. Once alarmed, the host launches IC in this order: Killer, Marker, Scramble, Acid, Jammer, Blaster, Binder, Crash, Sparky, and Black IC. If one of its IC gets bricked, it will continue down the chain before rebooting anything.
If the intruder bricks a single piece of IC, or if the alert persists for 4 Combat Turns, not one but two Security Troubleshooters will log into the system to boot (or preferably kill) the intruder.
用途:这一主机作为跨洋的所有经营的总控集成,包含了岩芯样本和其他探勘数据,可能会让竞争对手有很大兴趣,让它成为公司间谍活动的首要目标。或许会让人有些小惊讶,这个主机而非管理主机控制着每个采矿设施中的物理安保设备。由于主机的主要功能是控制采矿无人机和系统,很明显任何想要捣乱的破坏者可能会想要进到这里。
剧透 -   :
Uses: As the main control hub for all of Trans-Oceanic’s operations, this host contains information regarding core samples and other prospecting data that would be of great interest to rivals, making it a prime target for corporate espionage. Perhaps a little surprisingly, it is also this host and not the administrative one that controls physical security devices in each mining installation. Since the host’s prime function is to control mining drones and systems, it should be clear that any saboteur looking to do some damage would probably want to go through here.

管理主机 ADMINISTRATIVE HOST

主机等级:7
通常配置:攻击性7,隐匿性8,数据处理9,防火墙10
安保流程:巡逻IC随时运行。一个标准安保蜘蛛随时巡逻。一旦警报响起,主机会依照以下顺序放出IC:杀手、探头、寻血猎犬、记号笔、冲击波、木马和黑IC。如果其中一个IC被砖化,它会用下一个战斗轮重启那个IC,而不是继续到下一个。在警报响起3个战斗轮后,两个额外的安保蜘蛛会登录进来。
这一主机的安保策略中大量使用了追踪。跨洋有一个安保规则,是物理上追捕在他们主机中被抓住的人来进行审问。跨洋和游侠有着紧密的联系,以逮捕嫌犯。如果追踪不是一个可行选择,安保会试图尽快把用户甩出去。任何被怀疑试图对主机整体造成损失,或者特别以供需算法为目标的用户都肯定会遇到三个安保处理专家。如果可能的话,仍然会尝试追踪,但首要目标是让造成的损失最小化。关闭主机永远不是可选项,但把大多数文件收进文档服务器是个可行的办法。任何收集到的与嫌犯身份相关的信息会分享给GOD。

剧透 -   :
Security Procedure: Patrol IC running at all times. One Standard Security Spider patrolling at all times. Once alarmed, the host launches IC in this order: Killer, Probe, Bloodhound, Marker, Blaster, Binder, and Black IC. If one of its IC gets bricked, it will use the next Combat Turn to reboot that IC rather than moving on to the next one. Two additional Security Spiders will log in after 3 Combat Turns of the alarm sounding.
The security strategy of this host makes heavy use of Tracing. Trans-Oceanic has a security dogma of physically hunting down anyone caught in their host for interrogation. Trans-Oceanic has a standing contract with Knight Errant to apprehend suspects. If tracing is not a viable option, security will attempt to dump users as quickly as possible. Any user suspected of attempting to cause serious damage to the host as a whole, or specifically targeting the supplyand-demand algorithms, will warrant the arrival of a three Security Troubleshooters. If possible, Tracing will again be attempted, but the priority will be to minimize damage. Shutting down the host is not an option, but sticking most files in the archive is. Any and all information gained about the suspect’s identity will be shared with GOD.
用途:作为一个标准的公司值钱数据仓库,骇入跨越矿业管理主机会有许多收获。私人文件、财务数据、公司备忘录……都在这里。主机内还有价值甚高的预测算法,控制着经营的产出——根本上,这是对公司会挣多少钱的直接控制开关。企业法庭禁止直接干扰这些东西,所以一定是个非常勇敢的约翰逊先生才会命令去破坏它,不过可否认的人员嘛,你知道,毕竟是可否认的。另外,值得一提的是,在管理主机内的闯入者会更容易从这里登入经营主机。角色在管理主机上拥有的每个MARK都会为尝试骇入经营主机的〈暴力破解〉或〈后台入侵〉提供+2骰池调整。
译注:deniable assets一般指的是狂奔者,也就是说Mr. J会拒不承认有雇佣这码事。

剧透 -   :
Uses: As a standard repository of juicy corporate paydata, there are many rewards to hacking Trans-Oceanic Mining’s administrative host. Personnel files, financial data, corporate memos … it’s all there. This host also contains the high-value predictive algorithms that dictate the output from operations—essentially, a direct control switch to how much money the corporation will make. The Corporate Court forbids interfering directly with these, so it would take a very brave Mr. Johnson to order sabotage on them, but deniable assets are, you know, deniable. In addition, it is worth noting that invaders in the administrative host can leverage access here to log into the operational host. While marks do not transfer over, exactly, they do make things a lot easier. Characters gain +2 dice per mark held on the administrative host to any Brute Force or Hack on the Fly attempts against the operations host.

工程 ENGINEERING

工程是另一个包罗万象的术语,基本上包括了任何设计东西,而非实际大规模制造它的行业。这包括利用化学、材料或机械工程设计现实产品,还包括像是软件这种无形的东西,甚至是社会工程学的神秘领域(这和市场营销有些不同)。它还可能是另一个神秘领域——设计魔法公式。
剧透 -   :
Engineering is another very large catchall term that basically encompasses any business that designs stuff, rather than actually manufacturing it. This can include designing physical products utilizing chemical, material, or mechanical engineering, or it can involve intangible ones like software or even the arcane realm of social engineering (which is a little different than marketing). It can also be the other arcane realm of designing magic formulas.
很明显,工程领域的主机需要忠实地再现物理。无论他们在设计的是什么,它都需要针对现实世界的状况进行测试。大多数工程公司会设法制造出真的原型机,把它放在现实状况中进行测试,但矩阵更能够生成极端现实的状况,从而虚拟测试产品。这就是如今做事的方式。任何实际测试产品的公司会花费甚多,远胜于其竞争对手。当然,有时这意味着你会拿到一把阿瑞斯·断钢剑,这破产品本不应该通过大批量生产的审核,但这就是现代商业的代价(而且,不是想跑题,但断钢剑的问题远比它的工程设计要复杂——我知道这一点,是因为我雇了一队人让它如此。)
译注:感谢吉米先,阿瑞斯·断钢剑是一把特别烂的枪,有个模组为此设计。

剧透 -   :
It’ll be obvious that hosts focusing on engineering need hosts that reproduce physics very faithfully. Whatever it is they are designing, it has to be tested against real-world conditions. Most engineering companies will get around to actually prototyping their thingamajig and testing it in real conditions, but the Matrix is more than capable of generating extremely realistic conditions to test products virtually. That’s just the way things are done nowadays. Any corporation that actually tested their products would have costs far, far higher than competitors. Sure, every now and then that means you get an Ares Excalibur, a piece-of-shit product that should never have been green-lit for mass-production, but that’s the cost of modern business (and, not to digress, but the Excalibur had problems far more complex than its engineering—I know, ’cause I hired teams to make sure of it).
因此,工程主机倾向于更小,更紧密,依赖小型而富有经验的工程师团队,而非大堆的人力。因为依照定义,他们致力于什么方面的下一次重大革命,致力于赢得接下来竞争上的优势,致力于成为下一次的规则改变者,安保就成了重中之重。工程数据超级容易被窃取:它只是计划、设计、测试结果。它就是你能轻易下载的数据。这意味着工程主机倾向于有着完善的安保流程。你能预料到几乎一切在文档服务器外面的东西都被保护着,安装着强大的数据炸弹。骇入工程环境的第一条规矩就是:在你很确定自己恰当地解除了防御之前,别碰任何东西。数据炸弹几乎总是会破坏它们保护的文件。在碟板上运行恰当的程序来助你一臂之力或许是个好主意。只是想想,你知道的。
剧透 -   :
Engineering hosts thus tend to be smaller and tighter, relying on small, highly experienced teams of engineers rather than tons of manpower. Because they are pretty much by definition working on the next big revolution in whatever, the next competitive advantage, the next game-changer, security is a big concern. Engineering data is highly stealable: It’s all just plans, designs, test results. It’s all data you can download pretty easily. That means engineering hosts tend to have highly developed security procedures. You can expect pretty much everything to be protected and to be laced with very powerful data bombs, if it’s even outside of the archive. Rule number one of hacking an engineering environment: Don’t touch anything ’til you’re good and sure you’ve properly disarmed defenses. Data bombs almost always destroy the files they were guarding. It’s probably a good idea to load up your deck with the proper programs to help you succeed here. Just a thought, you know.

引用
瑞士公司技术 SOCIÉTÉ SUISSE TECHNIQUE

瑞士公司技术(SST)是物部国际的子公司,是一所大型通用工程公司。这一公司相应地拥有数间自己的子公司,在许多领域内研究创新,包括建筑技术、医疗和基因科技、化学、发动机、材料和纳米技术。公司同时的投资项目没有上千也有数百。有些是与其他想要为问题寻找到新解决方案的公司签订合同,直接由他们投资,而有些纯粹的研究开发则是SST想先抢占专利,然后再去寻找应用的办法。
剧透 -   :
A subsidiary of Monobe International, Société Suisse Technique (SST) is a large general engineering firm. The corporation, which in turn owns several subsidiaries itself, researches innovations in many fields, including building technologies, healthcare and genetics, chemicals, engines and motors, materials, and nanotechnology. The corporation has investments in hundreds, if not thousands, of projects at once. Some are directly funded by contracts from other corporations to find new solutions to problems, while some are pure R&D that SST will patent first and find a use for later.
SST最近花了一大笔钱,让矩阵设计领域领头的合资企业和心理学家结合成了一个充满聪慧大脑的团队,设计一个最能发挥出SST创造性才能的主机。任务是设计出的主机VR,哪怕仅仅是体验它一下,都会不停地挑战先入为主的概念,发挥用户的头脑,加强创造性思维。万幸的是,其结果并不像有人害怕的那样诡异。SST的环境被塑造为某种坐落山巅的巨大花园或森林。不过,这里的植物很奇妙。白桦有着深红色的叶子,樱桃树长出浅蓝色的枝叶,一池子乳白色的水中长出亮黄色的百合花,天空中肆虐着彩色条纹,就像苍穹堪堪包裹住爆炸的狂日。极简主义的古典寺庙建筑构成了花园野性的边框,融合了佛教和希腊罗马的建筑风格。
剧透 -   :
SST recently spent a fortune bringing together a joint venture of top-dog Matrix design firms and psychologists to create a panel of brilliant minds focused on creating a Host that would get the most out of SST’s creative talent. The task was to design a host VR that would, simply by experiencing it, constantly challenge preconceived ideas and work the minds of its users, forcing creative thought. The result, thankfully, isn’t quite as wacky as one might have feared. SST’s environment is shaped like a sort of gigantic garden or forest perched high on a mountain top. However, the vegetation is fantastic. White birches with leaves of crimson red, cherry trees with lightning-blue foliage, ponds of milky-white water with bright yellow lilies, and a sky wracked with epic streaks of color, like the firmament can barely contain the explosion of a mad sun. Minimalist classical temple structures, a free mix of Buddhist and Greco-Roman architecture, frame the wildness of the garden.
访客被赋予了超自然的力量。虽然掌握这些力量一开始很难,但用户可以学着控制自己的移动和力量,做到非凡的事情,像是跳过和飞过山巅、攀登大理石、铁和黄铜构成的巨石结构,或是游到水池深处。其理念和实际效果是植入一种史诗感,让人把自己重新体认为神。主机通过解锁新力量奖励坚持不懈,而且永远都有新地方去探索,虽然那些地方很难抵达。因此,项目团队可以进行虚拟远足,攀爬陡峭嶙峋的棕色山脉,跃过裂谷,用弓箭捕猎小心翼翼的动物,而同时可以讨论项目,或是随着意念创造出产品。这个环境很棒很自由的同时,技术文件也可以随时访问。由于科学家和工程师在这个有着无限潜能,又没有先入为主局限的世界中让自己的思想为之一新,他们的创造性思维得以活跃和延伸。
剧透 -   :
Visitors are endowed with supernatural powers. Though wielding these powers is difficult at first, users can learn to control their movement and strength to do fantastic things like leap and fly across mountaintops; scale the megalithic structures of marble, iron, and brass; or swim deep into the ponds. The idea, and truthfully the effect, is to instill a sense of epicness and rediscover oneself as a god. The host rewards persistence by unlocking new powers, and there are always new places to visit, though they are challenging to reach. Thus, project teams can go on virtual excursions, scaling steep, jagged brown mountains, leaping across chasms, and hunting skittish fauna with bow and arrow, all while discussing the project among themselves or crafting the product with their minds. While the environment is great and free, technical files are accessible at all times. As scientists and engineers reboot their minds in a world of limitless potential without any preconceived limits, their creative thoughts bounce around and expand.
虽然SST凭借他们的VR,在许多标准下都取得了非凡的财务上的成功,但不幸的是,它也带来了秘密花销。瑞士公司的财务在主机塑模过程中一转势头,变得很糟,而公司发行自己已经捉襟见肘。削减或放弃这一非凡的创造空间的主要景观会导致公关上的致命打击。它已经向整个世界证明了他们是最顶尖的,因为设计非常公开透明,在内部雇员和整个世界中大肆宣传。与此相反,管理层决定秘密地削减安保。SST对公众宣称他们的主机配备了最新最致命最前沿的IC,与矩阵安保公司签订合同,保证最高级别的安全。事实上,SST靠的是用这些宣称作为威慑物,因为实际上在他们说的那么多背后,实际做的很少。SST缺乏IC,无法承担安保合同。公司正在争取每一点钱来弥补漏洞,但由于如今对公众扯谎,他们处于一个非常棘手的局面。突然转移太多钱会暴露他们的谎言,因为投资者会质疑报表上的数字。保险公司会知道,调查他们的欺诈行为,投资者会离开,而公司会沦为破产或被恶意收购。所以SST必须为暗地里昂贵的操作花更多的钱,从而安静地建立起稀烂的资金储备,缓慢地升级安保,不断地希望不会有缺口把他们使用最先进安保的毫无根据的宣传曝光出去。
剧透 -   :
While SST has by many standards achieved incredible functional success with their VR, this has unfortunately come with a rather secretive cost. Société Suisse’s finances took a turn for the worse during the host sculpting process, and the corporation found itself strapped for cash. Cutting back or abandoning the main vision for this incredible creative space would have been a very public death blow. It would have shown the entire world that they were bleeding, as the designs had been made very public and hyped both to internal employees and the wider world. Instead, management decided to secretly cut back on the security. Publicly, SST claims their host features the newest, most lethal cutting-edge IC and contracts with Matrix security firms guaranteeing the highest standard of security. In truth, SST is relying on these big claims to act as a deterrent, because behind the talk is very little walk. SST is anemic on IC and unable to afford security contracts. The firm is scrambling for money to patch these holes, but having now publicly lied about it, they are in a sticky situation. Diverting too much money all of a sudden would expose their lies, as investors would question the figures. Insurers would get wind and investigate them for fraud, investors would bail, and the corporation would tailspin into bankruptcy or hostile takeover. So SST must spend more money on shadowy, expensive dirty-ops consultants to quietly build a slush fund reserve and slowly upgrade their security, all the while dearly hoping no breaches expose their groundless claims to state-of-the-art security.

主机等级:5
通常配置:攻击性6,隐匿性8,数据处理7,防火墙5
安保流程:巡逻IC随时运行。一旦警报响起,主机会依照以下顺序放出IC:探头、记号笔、木马、崩溃和干扰。如果其中一个IC被砖化,它会用下一个战斗轮重启那个IC,而不是继续到下一个。并没有应对入侵的待命蜘蛛。
瑞士公司技术的主机现在并没有受到保护。SST正尽力称颂它新的、致命的安全系统。每个人都听说了SST的传奇系统,知道它理应有多安全。任何雇佣的约翰逊先生(和被雇的碟客)都知道这一系统理应是无法破解的,所以计划窃取信息会考虑到这样可怕的防御。任何进入系统的骇客都会开始想为什么事情如此简单,提心吊胆地琢磨坏结果什么时候出现。

剧透 -   :
Security Procedure: Patrol IC running at all times. Once alarmed, the host launches IC in this order: Probe, Marker, Binder, Crash, and Jammer. If one of its IC gets bricked, the host uses the next Combat Turn to reboot that IC rather than moving on to the next one. There are no spiders on-call in case of intrusion.
Société Suisse Technique’s host is currently rather underprotected. SST has done its best to laud far and wide its new, killer security system. Everyone knows about SST’s legendary system and how secure it is supposed to be. Any Mr. Johnson hiring (and any decker hired) knows that this system is supposed to be uncrackable, so plans to steal information would take such formidable defenses into consideration. Any hacker that then makes it into the system may find herself wondering why things are so easy, and when the other shoe is going to drop.
用途:瑞士公司技术是一个纯工程公司,而且是最好的那些中的一个,所以任何它正在研究的东西都会引起竞争对手公司,甚至是和SST有正在进行项目的公司的某些竞争派系的潜在兴趣。除了他们的想法之外,还有人嫉妒SST的员工质量,也就是产生上述想法的人。竞争公司总是有兴趣挖角那些有天分有知识的人,从高级项目领导到崭露头角的初级新贵,都前途光明。所有这些攻击都需要矩阵活动,包括突袭主机获取数据,或是入侵主机来支援物理闯入。如果主机里的防御和大肆宣传并不相符的消息走漏出去,许多团体(从竞争对手的投资者,到物部巡查员的保险公司)对SST的管理和财务数据的兴趣也会提供非法入侵主机的全新理由,因为调查者们开始搜寻藏在这不一致背后的真相。
剧透 -   :
Uses: Société Suisse Technique is a pure engineering corporation, and one of the top ones, so anything and everything they are working on is potentially of interest to a rival corporation, or even rival factions within corporations that have ongoing projects with SST. Aside from their ideas, SST is envied for the quality of their staff, the people who come up with said ideas. Rival corporations are always interested in extracting talented and knowledgeable personnel, from senior project leads to junior hotshot upstarts showing lots of promise. All of these attacks require Matrix activity, including raiding the host for data or invading the host in support of a physical intrusion. If word ever got out that the defenses of the host did not match the hype, interest in SST’s administrative and financial data from many interested parties, from investors to rivals and insurers to Monobe inspectors, would also cause a whole new reason for illicit traffic on the host, as investigators began searching for the truth behind the disparity.
« 上次编辑: 2018-06-06, 周三 01:56:23 由 妖猫 »




离线 妖猫

  • Hero
  • ****
  • 帖子数: 635
  • 苹果币: 3
Re: 【DT】完美主机 THE PERFECT HOST P82-105
« 回帖 #6 于: 2018-06-06, 周三 11:14:51 »
防御 DEFENSE

防御产业的世界中包括了许多分支:政府武装部队、准军事安全公司、雇佣军组织,还有超企的内部防御小队。它们都贪得无厌又专于一门地爱着矩阵主机。现代战争的90%是智力,而(就像谚语说的)外行操心战术,专业人士操心组织。军事和安保部队完全依赖于他们的信息网络。要素之间的密切协调十分关键,而劣等的通信会比空弹夹更快地要了你的命。主机经常被用来作为士兵装备和战斗载具的主控网络。在这样的设置下,战场上的所有设备都从属于主机,如果它们屈服了,所有东西都会屈服,变成地平线上的一场屠杀。除去这种直接的战术用途,军方会用主机让合适的士兵带着合适的装备,出现在在合适的时间地点。这一非凡的能力本身就要求一个强大又组织明晰的主机。当然,最重要的关注点是安保。我想引用一些孙子超棒的话,但坦白讲,你们不需要古代中国的军事天才告诉你就能明白,如果你的敌人知道了你的计划,你就死定了。同样糟糕的是,如果敌人能在主机里植入虚假的通信,你就会被加倍干死。因此,军队不会在主机安保这件事上胡闹。这些主机的塑模从一开始就考虑到了安保问题,而且访问协议被严格执行。就像任何骇客好手会告诉你的,主机防御最薄弱的部分就是使用它的人。军队清楚这点,而且加倍小心地盯着这点。在军用规格主机中有嫌疑的活动会比任何其他环境都更快引发警报,因为那些主机必须忍受合法但愚蠢的用户在里面摸索造成的误报。在军方主机中,你必须一丝不苟地遵守命令,否则你就会失去你使用主机的权力。或者,还有更糟的,你的脑子会被烤糊。
剧透 -   :
The world of the defense industry, including the various branches of governmental armed forces, paramilitary security corporations, mercenary outfits, and megacorporate in-house defense teams, is a voracious and specialized lover of matrix hosts. Modern warfare is ninety percent intelligence now, and (as the adage goes) amateurs worry about tactics but professionals worry about logistics. The militaries and security forces of the world are wholly dependent on their information networks. Close coordination between elements is critical, and inferior communications can spell death more readily than an empty clip. Hosts are frequently relied upon as nexus masters for soldiers’ gear and battle vehicles. In such setups, with all field devices slaved to them, if the host gets compromised, everything gets compromised and a massacre looms on the horizon. Outside of such directly tactical roles, militaries use hosts to get the right troops to the right place at the right time with the right gear. That in itself is an incredible feat requiring powerful, organized hosts. Of course, the paramount concern is security. I’d quote some fancy Sun Tzu crap, but frankly you don’t need an ancient Chinese military genius to tell you that if your enemy knows your plans, you’re fragged. As bad as that is, if the enemy can insert false communication in there, you’re doubly fragged. So military forces don’t mess around with the security of their hosts. They are sculpted from the ground up with security in mind, and access protocols are rigorously enforced. As any good hacker can tell you, the weakest part of a host’s defenses are the people who use it. The military knows that and watches out for that shit with both eyes open. Suspicious activity within a milspec host will lead to an alarm far, far faster than in any other environment that must be tolerant of legitimate but idiotic users fumbling around in there and causing false positives. In military hosts, you either act like you’ve been meticulously instructed to or you will lose your privileges. Or, worse yet, your brain will get fried.

引用
游侠西雅图东区主机 KNIGHT ERRANT SEATTLE EAST PRECINCT HOST 

游侠最近在西雅图推出了一个试点计划,在每个区都设置一个主机。所有区域资产(巡逻车、武器、通讯链等等)都设为这一主机的服从机,便于中央命令和监测。这允许区域的指挥官随时了解每个东西都在哪里,而附加的好处是主机为这些设备提供了比没有主控机的时候好得多的安全防护。
由于游侠是大量骇客(从想要理所当然地搞破坏的朋克,到想要用潜在的致命结果破坏警方资产的危险罪犯)的首要目标,安保是重中之重。游侠主机不断地监视不属于授权用户的MARK,而且除此之外,还有一个结实的防火墙。

剧透 -   :
Knight Errant recently rolled out a pilot program in Seattle to have one host per precinct. All precinct field assets—patrol cars, weapons, commlinks, etc.—are being slaved to this host for central command and monitoring. This allows the precinct commander to know at all times where everything is, with the added bonus that the host provides better security than the unslaved devices would normally have.
As Knight Errant is the number-one target for a slew of hackers, from vandal punks looking to mess with pigs as a matter of course to dangerous criminals seeking to subvert police assets with potentially lethal consequences, security is a massive concern. Knight Errant hosts are constantly monitored for marks that don’t belong to authorized users, in addition to having a generally beefy firewall.
不过,许多警察并不怎么相信这个系统。一方面,许多人对于他们的装备被如此轻易地追踪和监测感到不怎么舒服,因为大多数头发斑白的街头警察知道有时候他们得通融一下,而部门不知道的东西就不会害到他们。当然,许多人也害怕强大的骇客破坏了区域主机,关闭了他们所有的武器。这让大多数警察随身带着没有连接到主机的副武器,以防万一。至于私人赛博改造,这就更难以说清。有些人买了账,觉得主机防御远比任何他们自己搜集的东西要强,把它们都设为了主机的服从机,而其他人不打算把自己殖装身体的正常运作交到某些矩阵民工手里。
剧透 -   :
Still, many cops don’t quite trust the system. For one, many don’t feel comfortable with all their gear being so easily traced and monitored, as most grizzled street cops know that sometimes you have to bend the rules, and what the department doesn’t know can’t hurt them. Of course, many just fear the idea of powerful hackers subverting the precinct host and deactivating all their weapons. This has led most cops to carry sidearms not linked to the main host, just in case. As for personal cyberware, it’s a toss-up. Some subscribe to the idea that the host’s defenses are far stronger than anything they could muster on their own and so have slaved it all to the host, while others aren’t about to put the proper functioning of their augmented bodies in the hands of some pixel-pushers.
这个丑陋、功利,看上去根本就没完成的主机VR塑模并没有帮助游侠解决在普通警官中推广实行的问题。这里的现实呈现为一个巨大的盖世太保风格的一层建筑,周围围着带刺铁丝网。这个世界阴郁昏暗,只有红黑白三色。这一配色自然非常让人想起游侠办公室的色调。VR的不详形式主要是设计来阻挡入侵者的,它呈现出的黑暗独裁的样子则是用来威吓那些想成为入侵者的人的。也许这有用,但其拟感对于那些日日夜夜需要用它的警官来说很不舒服。
剧透 -   :
Knight Errant’s adoption problem among the rank-and-file isn’t helped by the ugly, utilitarian, and seemingly incomplete sculpting of the host’s VR. The reality renders a large, one-story, gestapoesque precinct building, surrounded by a barbed-wire-topped chain-link fence. The world is a dark gloom, colored in red, black, and white. The palette is of course very reminiscent of the Knight Errant official color scheme. The foreboding appearance of the VR is mostly designed to keep intruders out, presenting a dark, authoritarian look designed to intimidate would-be intruders. Perhaps it works, but the simulation is unpleasant for the officers who need to make use of it, day in and day out.
游侠的化身经常呈现为身材宽大、肌肉发达的士兵。这些化身真的不怎么多样化,看上去非常相似。游侠正通过不设置有性别的化身图标来解决质疑歧视行为的诉讼。不过,访客会使用自己通讯链生成的化身,这通常会相当异常地与虚拟现实主题相冲突。
除了作为所有现场设备的主控机,主机还被用于所有当地的区域业务。紧急呼叫打进来,由登入的调度员进行处理。在调度员和小队间的通信随后从主机中发送出去。主机内有一些本地人力资源数据和活动,不过其中许多都由更大的游侠公司中央主机处理。区域主机里还有一些本地的逮捕记录,一些罪犯和嫌犯的信息,不过这一信息很快就会备份到游侠中央主机。

剧透 -   :
Knight Errant personas appear as broad, muscular soldiers. The personas really aren’t diversified much, looking pretty generic. Knight Errant is presently looking to settle lawsuits that allege discriminatory practices by not offering female avatars as well as male. Visitors, on the other hand, use their own commlinkgenerated personas, which typically clash rather aberrantly with the virtual reality theme.
Aside from having all field gear slaved to it, the host is used for all local precinct business. Emergency calls come in, to be handled by the logged-in dispatchers. Communication between the dispatchers and units is then sent out from the host. The host maintains some local HR data and activity, though a lot of that gets handled by the larger central Knight Errant corporate host. The precinct host also maintains local arrest records and some information on criminals and suspects, though this information is quickly backed up to the central Knight Errant Host.
大量理论上应当属于本地区域的信息仍然被公司主要主机控制。像是基础设施或是装备维护预约、本地补给管理,还有其他类似的小东西并没有被本地管理。由于安全考虑,在普通警官中推广实行有很大问题,而同时区域经理对于新系统造成的可见性问题非常不开心。人们为了维护、服务或是送货上门而出现在这里,而本地警局对此一无所知。这导致在区域的调度问题也很窘迫。街头警察会抱怨他们的每日工作而非IT问题。与其相反,办公室职员会乐于跟公司总部同僚扯皮,让他们知道自己对新系统的不满。
主机试点项目高效地获得了大规模的失败,但项目经理让他们的老大相信了这并非他们的错,片区必须被带回正规。某个有点常识的人最终会把这个项目称为失败,但在现在,在系统的批评者(也就是所有用户)和它的支持者(IT部门)之间的角力还在继续。

剧透 -   :
A slew of information that, in theory, should belong to the local precinct is still being handled by the main corporate hosts. Little things like infrastructure and gear maintenance appointments, local supplier management, and other such things are not kept locally. While there is an adoption issue among the rank-andfile due to security concerns, precinct managers are seriously unhappy about the visibility issue the new system has caused. People show up for maintenance and servicing or for deliveries, and the local office knows nothing about it. This is causing major scheduling issues at the precincts as well as embarrassment. Street cops may grumble that they are too distracted by their daily duties to do much about the IT problem. The office staff, on the other hand, is more than happy to engage in petty little bitchery competitions with their counterparts from corporate HQ to make their displeasure at the new system known.
The host pilot program is effectively a massive failure, but the project managers have convinced their bosses that it isn’t their fault and the precinct must simply be brought in line. Eventually, someone with some common sense will call the program the failure that it is, but for now, a tug-of-war between the system’s detractors (i.e., all the users) and its supporters (i.e., the IT department) continues.

主机等级:6
通常配置:攻击性6,隐匿性7,数据处理8,防火墙9
安保流程:巡逻IC随时运行。两名次级安保蜘蛛一旦警报响起,主机会依照以下顺序放出IC:探头、追踪、焦油宝宝、记号笔、震撼弹、崩溃和杀手。如果其中一个IC被砖化,它会在重启任何IC之前沿着顺序继续下去。一个标准安保蜘蛛会在警报触发后{1D6 / 2,向上取整}个战斗轮后抵达。
游侠大多数情况下面对的是本地攻击,所以他们很有兴趣追踪闯入者。一旦完成了一次成功的追踪,如果这是在西雅图都市群内的话,一辆KE的巡逻车就会在{1D6}分钟内抵达追踪到的位置。

剧透 -   :
Security Procedure: Patrol IC running at all times. Two Junior Security Spiders logged in at all times.
Once alarmed, the host launches IC in this order: Probe, Track, Tar Baby, Marker, Shocker, Crash, and Killer. If one of its IC gets bricked, the host will continue down the line before rebooting any. A Standard Security Spider arrives (1D6 / 2, rounded up) Combat Turns after an alarm is triggered.
Knight Errant mostly faces local attacks, and so are very interested in tracing down intruders. Once a successful Trace is completed, a KE squad car will arrive at the traced site, if it is within the Seattle Metroplex, within (1D6) minutes.

用途:如果遇到了这一试点项目运行的区域的警察,骇客可能会需要骇入这个主机,或者与其相似的某个。对于大多数骇客来说,临时要穿梭于这一主机会是不小的挑战。当然,他们必须成功,随后必须极快地解除遇到的警官的武装。除去这些即时的战-逃反应的需要之外,这一区域主机是获取当地案件或(在有限的程度上)当地警官信息的好去处。它还是散播假情报造成混乱,为虚张声势散播支持证据的好地方。
剧透 -   :
Uses: Hackers may find a need to hack this host, or one similar to it, if confronted with cops from a precinct operating under the pilot program. Slicing through such a host on short notice will be quite a challenge to most hackers. Should they succeed, of course, then they should be able to quickly disarm the officers confronting them. Outside of immediate fight-or-flight needs, the precinct host is a wonderful place to get information on local cases and, to a limited extent, local officers. It is also a great place to plant disinformation to sow confusion and plant supporting evidence for bluffs.

能源 ENERGY

在能源领域的公司或许比其他领域的都更要依赖主机的计算力。坦白说,在能源领域和第一产业之间有着很多相似之处。就和矿业之类的一样,能源这场游戏的名字也是“让产量恰好满足快速波动的需求”。现在所有的电网都是智能电网了,自动调节消费来降低损耗,这反过来允许电厂在非关键时期减缓其生产活动。在能源生产中真正重要的是高峰期。
剧透 -   :
Corporations in the energy sector rely on the computing power of hosts perhaps more than any other sector. Frankly, there are a lot of parallels between the energy sector and the primary sector. Just like for miners and their ilk, the name of the game in energy is producing just enough to meet rapidly fluctuating needs. All power grids are smart power grids now, auto- regulating consumption to reduce waste, which in turn allows power plants to slow down production during non-essential times. What truly matters in energy production are peak periods.
电厂要么能满足高峰需求,要么不能。如果电厂不能生产足够的能源,公司就需要从其他生产能力更强,而且要价更贵的电厂买电,以此弥补差额。在任何情况下,断电都是不能接受的,无论要花多大代价,都必须让灯火继续亮着。但只要是必须购买补充的时候,利润率就会飞速下降。因此,需要用高度复杂的计算机来监控网域、控制和监控电厂;实时与其他设施交易,在需要的时候购买高峰补充电能;与资源供应商交易,从而让整个企业全速运转。电厂由极度复杂的设备构成,带有数百万个持续监测系统的传感器。涡轮和核心尤其重要,因为融解或致命的错误会导致整个区域的毁灭(就像能在SOX或苏格兰辐射区(Scottish Irradiated Zone)看到的那样)。多重关闭阀门和子系统保证不会让随便什么骇客随随便便就让文明濒临崩溃,但厉害的骇客仍然能在这里造成很大破坏。由于能源是少数几个能让所有公司都一致认为十分必要的东西,针对电厂的电子战争会让他们发布命令,用极端手段消灭你——在你来得及说“不是我干的”之前。当然,有些最近的例子说明没人会在乎底线。我从一只小鸟那里听说,不久之前有人让狂奔者去波哥大,炸烂赛达尔-克虏伯在那里的电厂,而并没有雷神炮来制裁这些入侵者。就像所有企业掺和的事情一样,当然,这完全取决于损失了多少钱。
剧透 -   :
Power plants can either meet peak demand, or they can’t. If a power plant can’t produce enough, then the power corporation needs to buy the missing amount from another, more powerful, and more costly plant. In any case, blackouts are not acceptable, so the lights must stay on, no matter the cost. But whenever a supplement must be bought, the profit margin erodes at high speed. Thus, highly complex computers are needed to monitor the grid, control and monitor the power plants, transact in real-time with other facilities to buy supplementary peak power when needed, transact with resource suppliers, and generally keep the corporation running at full speed. Power plants are extremely complex devices with millions of sensors monitoring the system at all times. Turbines and cores are especially important, as meltdowns and critical failures can cause the destruction of entire regions (as can be seen in places like the SOX or the Scottish Irradiated Zone). Multiple shutoff valves and sub-systems ensure that some random hacker won’t be able to bring civilization to its knees, but a hot decker can still do a lot of damage in there. Since power is one of the few things all corporations can agree is necessary, cyber warfare targeting power plants will make them issue an order to exterminate with extreme prejudice faster than you can say “it wasn’t me.” Of course, there are recent examples of nobody giving a frag about lines in the sand. I heard from a little bird that someone had shadowrunners running around Bogotá not long ago blowing up Saeder-Krupp’s power plants down there, and no Thor shots went off to punish the offenders. Like all things when the corps are involved, it depends on exactly how much money is being lost, natch.

引用
贝尼迈特海尔ISCC主机 ISCC AIN BENI MATHAR HOST

贝尼迈特海尔光热联合循环电站(更简单的称呼是“贝尼迈特海尔ISCC”)坐落在摩洛哥北部茫茫荒野之中,是一个天然气电站。虽然电站生产的能源主要来自于天然气,但电站坐落于干旱荒漠之中,也可以从太阳能中产生出大量的能源。
电站正处于拖了很久的升级进程之中,它预期其能源输出会增长216%,而且也许更关键的是,它的效率会增长高达67%,让这一设施变为摩洛哥最大的三家电站之一。这些能源中的相当部分会过剩,卖往欧洲。推动这一计划的是以赛达尔-克虏伯为首的利益集团,其中还有斯普兰德工业和一些本地的发展银行。

剧透 -   :
The Ain Beni Mathar Integrated Thermo Solar Combined Cycle Power Plant, much more succinctly known as “ISCC Ain Beni Mathar” is a natural gas power plant sitting in the middle of nowhere in northern Morocco. While the majority of power produced by the plant comes from natural gas, the power plant, parked right in the arid desert, can generate a significant portion of its power from solar energy as well.
Currently going through a long-overdue upgrade process, the plant should see its power output expand by 216 percent and, perhaps more critically, see its efficiency boosted by up to 67 percent, making the facility one of the top three power plants in Morocco. Much of that energy will be surplus destined for sale to Europe. The project is being run by a conglomerate of interests headed by Saeder-Krupp, including Spinrad Industries and some local development banks.
要是S-K和斯普兰德之间的被迫合作还不算糟,另一个S-K的死对头沙暴工程(Sandstorm Engineering)被迫退出交易,被晾在一边生闷气。说这个项目有风险都算是保守说法,不过S-K在这个项目里有太多钱赚,绝不会放任它失败。
贝尼迈特海尔ISCC主机仍然在进行塑模升级,但很大程度上是实用为主。主机呈现为某种漂浮在云端的飞艇宫殿。奢侈豪华的庄园是摩尔风格的。巨大的穹顶由令人生畏的拱门支撑着,拱门上装饰着精细的几何图案,通向巨大的铺着瓷砖的房间,里面简单地用多彩的垫子和流动的帷幔装饰着。蔚蓝的天空被宫殿镶嵌着宝石的白墙围住。

剧透 -   :
If the forced cooperation between S-K and Spinrad wasn’t bad enough, another sworn enemy of S-K, Sandstorm Engineering, was left fuming on the sidelines when they were maneuvered out of the deal. To say the project is at risk would be an understatement, though S-K has too much to gain in the project to let it fail.
ISCC Ain Beni Mathar’s host is still undergoing sculpting upgrades but is largely functional. The host renders as a sort of airship palace floating in the clouds. The luxurious estate is built in the Moorish style. Large domes supported by intimidating archways decorated with fine geometric patterns give way to huge tiled rooms with simple furnishing accented by colorful cushions and flowing draperies. The azure blue of the sky surrounds the whitewashed, gem-encrusted walls of the palace.
飞艇的上层区域用作大多数人的办公场所。要想接入电力控制系统,用户必须把自己塞进连着飞艇船体底面的一个小铜罐里。这个铜罐会逐渐向下沉,伸长变为通向云层中的柱子。用户越向下,就越会发现在更低的高度是看不到飞船周围的明亮蓝空的。其中的虚拟现实让飞艇平稳地飘在你能想象的最强的风暴之上。在这个小铜隔间里,用户会陷入分崩离析的天空之中。飓风席卷,电闪雷鸣,不停摇晃着罐子。铜罐里面有复古样式的仪表和测量器,允许用户对能源核心(也就是风暴云)进行需要的操作。
剧透 -   :
This upper section of the airship serves as working environments for most of the personnel. To access the powercontrol systems, users must nestle themselves into odd little brass pods attached to the underside of the airship’s hull. The brass pods then slowly descend down telescoping poles into the clouds. The lower the user goes, the more they will discover the bright blue skies that surrounds the airship are not to be found at the lower altitudes. The virtual reality has the airship floating peacefully on top of the worst storm imaginable. Inside the tiny little brass cabin, users are plunged into a sky rending itself asunder. Hurricane-strength winds gust by as lightning crackles and thunder booms, shaking the pod. The brass pod contains archaic-looking clockwork instrumentations and gauges that permit the user to perform required operations to the power core (i.e., the storm clouds).
完全不推荐在主机内触发警报——特别是不要在困在那些小铜罐里的时候触发。在管理区域(飞艇)的IC呈现为穿着灰色西装,戴着墨镜,带着手枪的安保人员。而在风暴云中,IC是你周围的闪电、狂风和震耳欲聋的爆炸。
剧透 -   :
It is not advisable to trigger an alarm in the host—especially not when trapped inside one of those little brass pods. Within the administrative sections—the airship—IC renders as grey-suited, black-sunglasses-wearing, handgun-toting guards. Within the storm clouds, the IC is the lightning around you, the rattling winds and the booming explosions.

主机等级:7
通常配置:攻击性6,隐匿性7,数据处理8,防火墙9
安保流程:巡逻IC随时运行。一个标准安保蜘蛛随时巡逻。一旦警报响起,主机会依照以下顺序放出IC:探头、杀手、追踪、黑IC、崩溃、记号笔和电椅。如果其中一个IC被砖化,它会用下一个战斗轮重启那个IC,而不是继续到下一个。一名安保处理专家会在警报响起后{1D6}个战斗轮后抵达。

剧透 -   :
Security Procedure: Patrol IC running at all times. One Standard Security Spider patrolling at all times.
Once alarmed, the host launches IC in this order: Probe, Killer, Track, Black IC, Crash, Marker, and Sparky. If one of its IC gets bricked, it will use the next Combat Turn to reboot that IC rather than moving on to the next one. A Security Troubleshooter will arrive (1D6) Combat Turns after an alarm is triggered.
用途:虽然已经没什么可嘲笑的了,ISCC的主机预定在之后的几个月内完成它的升级,其效能和安保会增长几乎30%。许多这一计划的敌人(从来不缺这些人)因此看到了一个独特但正在缩小的机会来实施他们的计划。感兴趣的人从有所图的内部人员,到急于让计划破产的沙暴工程的约翰逊先生不等,都想要寻找强大的骇客来进行袭击。狂奔包括窃取计划配置的数据,植入以后激活的隐藏文件,或是通过控制核心进行彻底地篡改。当然,除非是现场在场,否则无法造成致命的打击,所以入侵来支援物理操作也很有可能。
剧透 -   :
Uses: While already nothing to scoff at, the ISCC’s host is scheduled to finalize its upgrades within the next few months, boosting its power and thus security by almost 30 percent. Many of the project’s enemies—are there is no shortage of those—thus see a unique but shrinking window of opportunity to enact their plans. Interested parties, ranging from insiders with agendas to Sandstorm Engineering Mr. Johnsons eagerly looking to derail the project, are all seeking competent hackers to perform raids. Runs include project spec data theft, imbedding hidden files to be activated later, or outright tampering with the core controls. Of course, no killing blow can occur with an on-site presence, so invasion in support of a physical operation is highly likely as well.
就这一部分来说,赛达尔-克虏伯并不是傻子。S-K反间谍特工已经充分意识到了周围的沙暴工程的捕食者,而且感觉他们能信任斯普兰德的程度就像是信任太平间里的食尸鬼。有很多合同想要可否认人员对项目内部人员进行监督和设套诱导,搜索和破坏在ISCC主机内的所有入侵者,给了狂奔者一个从另一面看待事情的独特机会,就这一次。
剧透 -   :
Saeder-Krupp, for its part, is no fool. S-K counter-intelligence agents are well aware of the circling Sandstorm predator and feel they can trust Spinrad about as much as ghoul in a morgue. Contracts looking for deniable assets to set up surveillance and string operations against project insiders and set up searchand-destroy operations within the ISCC host against any and all intruders are also on the table, giving shadowrunners a unique opportunity to look at things from the other side, for once.
« 上次编辑: 2018-07-15, 周日 11:16:37 由 妖猫 »




离线 妖猫

  • Hero
  • ****
  • 帖子数: 635
  • 苹果币: 3
Re: 【DT】完美主机 THE PERFECT HOST P82-105
« 回帖 #7 于: 2018-06-12, 周二 00:30:22 »
零售 RETAIL

哦,零售的奇妙世界。虽然公司差不多只乐于和彼此做生意,某些时候他们不得不浸入无知大众的泥潭,从他们身上榨取些钱,好让他们的其他生意得以继续下去。曾经和我谈过的大多数公司人都倾向于尽可能完全避开零售。在和其他公司处理生意的时候,他们了解他们的客户。他们的公司同僚就像他们自己一样。他们像彼此一样思考,不会在事情里掺杂私人感情,毕竟他们花的也不是自己的钱;而且他们每个人都知道自己得保持长期的工作关系,这一点磨炼了他们,他们知道对彼此适度地好一点(起码礼貌一点)会对所有人都有益处。在零售领域,你能把所有这些都丢在一旁不管。你对付的是数百万和你文化背景不同,在任何情况下都不会在意你的人。“顾客至上”的时代已经让这些粗野的蛮人感觉自己获得了权力,而且他们觉得自己持股更多。
剧透 -   :
Ah, the wonderful world of retail. As much as the corps would love to do business only with each other, at some point they have to dip into the mucky pool of the unwashed masses and fuck them out of some money so that they can go on with the rest of their business. Most corp suits I’ve ever talked to would prefer avoiding retail if at all possible. When doing business with other corporations, they know their client. They’re corpies just like themselves. They think like each other, don’t take things too personally since it’s not their money they are spending, and usually are tempered by the fact everyone knows they need to keep a long-term working relationship, so being moderately nice to each other—polite, at least—is in everyone’s best interest. In retail, you can throw all that away. You deal with millions of the little people who don’t share your culture and certainly don’t mind giving you shit on every occasion. Generations of “the customer is always right” has empowered these uncouth savages, and they think they hold the bigger piece of the stick.
但这些特征都是双向作用的。在这门分销给数百万对购买毫无专业知识的人的生意中,从他们身上抠钱可要容易得多(或者至少不会让他们从你身上抠出钱来)。每个顾客都是掏出营销技巧宝典的好机会,像是冲动购物、推荐销售,还有所有那些东西。在几十年前的一段时间内,靠在线评论和零售商控制之外的口碑,顾客在顾客-零售商的关系中占据上风,对产品和服务的质量给出清楚坦白的评论。当然,零售商不会让这类东西保持得住,所以现在它完全是由公司完美掌控的。通过无数的手段,比如干扰、牵制、虚假信息宣传、诋毁负面元凶,还有最常见的主导对话,零售商创造出了我们熟知且“深爱”的温暖、可爱、一切顺利的购物氛围。你刚买的新通讯链可能会爆炸,杀死你的宠物狗,但公众永远不会听说这类事情。零售商的洗脑能力强大至极,而品牌忠诚根深蒂固,没有哪个顾客会相信关于产品的任何坏话。
剧透 -   :
But these characteristics work both ways. With business distributed over millions of little guys with largely no expertise in purchasing, it’s a lot easier to screw most of them out of money (or, at least, not let them screw you out of money). Each consumer is an opportunity to break out the book of marketing tricks, such as impulse buys, upsells, and all that stuff. For a period of time a few decades ago, consumers held the upper hand in the consumer/retailer world, with online reviews and general word-of-mouth being outside of the control of retailers and presenting a frank review of the quality of products and services. Retailers weren’t about to let that kind of shit stand, of course, so nowadays all of this is perfectly controlled by the corporations. Through countless means, such as diversion and distraction, disinformation propagation, discrediting negative ringleaders, and generally leading the conversation, retailers have created the warm, cuddly, everything-is-always-all-right shopping climate we know and oh-so-love. The new commlink you just bought can explode and kill your pet dog, but the public will never hear of that kind of stuff. Retailers’ brainwashing is so powerful, and brand loyalty so ingrained, that no fellow consumer would ever believe anything bad about a product.
现在我已经抱怨够了,就让我们看看这会如何影响主机。也许我把它说得太像既定事实,但如此强大地正向操控大众观念实际上需要巨大的运算处理能力。零售主机实际上最关键的是三样东西。第一是控制库存和生意的会计记账,第二是为所有即将到来的购物人流提供主机,而最后一部分则基本上是所有的市场营销。
虽然很重要的一件事是待在供应链条的顶端,弄清楚你有多少小玩意,它们又值多少钱,这也需要许多精力,但这类东西早就在50年前就已经被计算机掌控了。这并不对任何主机构成实质上的挑战。

剧透 -   :
Now that I’m done ranting, let’s look at how that affects hosts. Perhaps I make it sound too fait accompli, but it actually takes a monstrous amount of processing power to positively control popular opinion so strongly. Retail hosts are about three things, really. The first is controlling stocks and the accounting of the business, the second is hosting all that incoming shopping traffic, and the last bit is basically all marketing.
While it’s important and requires a lot of energy to stay on top of the supply chain and figure out how many widgets you have and what it’s all worth, that kind of stuff was mastered by computers fifty years ago. So that’s not really challenging any host.
更重要一点的是拥有足够的运算能力,容纳大量来主机购物的客人。其他主机都不会像零售主机那样需要容纳那么大数量的人流。就像在实体商店里一样,这里最重要的因素是环境空间的样子和感觉。因此,这里的虚拟体验,也就是主机的塑模非常重要。
不过,零售主机的真正区别是在市场营销领域。零售商需要监控和他们产品和服务相关的所有可能的矩阵活动,从而控制它。异见被封锁后,零售商就能把注意力放在卖更多东西上了。这就需要了解顾客想要什么。由于大多数普通市民对自己的了解和对量子物理的了解差不多,零售商分析顾客的行为来理解他们,而非直接向他们询问。零售商得能预知顾客接下来会依照逻辑(或者更好的情况,不合逻辑地)买什么,然后在其他人之前把它提供给他们。

剧透 -   :
A bit more significant is having enough power to accept the huge volume of visitors hitting your host to come shopping. There are no other host types that need to accommodate as much user volume as retail hosts. The most important factor there is, just as is the case with a brick-and-mortar store, the look and feel of the space. So the virtual experience, the sculpting of the host, is very important.
The real differentiator for retail hosts, however, is in the marketing area. Retailers need to monitor all possible Matrix activity relating to their products and services so they can control it. With dissent (lost sales) bottled up, retailers can then turn their attention to making more sales. That comes from knowing what consumers are looking for. Since most Joe and Jane Civilians know themselves about as well as they know quantum physics, retailers analyze the behavior of consumers to understand them, rather than directly asking them. Retailers have to divine what consumers are logically (or, even better, illogically) going to buy next, and then offer it to them before anyone else.
主机的大多数运算力都被用于后一个活动之中。巨量的顾客信息被收集,随后进行分析。零售主机通常会和其他零售业公司买卖顾客的偏好信息,全都是实时的。这使用了主机运算力的绝大部分。毋庸置疑,零售业最要紧的就是大量处理。
剧透 -   :
Most of the processing juice of a host is dedicated to this latter activity. Prodigious amounts of information are collected on consumers and then analyzed. Retail hosts typically buy and sell consumer habit information with other retail industry corporations, all in real time. This uses most of a host’s processing power. Without any doubt, the retail industry is all about large volume processing.

引用
路易威登店,曼哈顿 LOUIS VUITTON STORE, MANHATTAN

奢侈品的生意看上去离大众市场的零售业(比如标准的杂货铺)有点距离,但游戏规则并没有多大不同。唯一的区别是“独家尊享”成了产品有销路的属性,而每件商品的价格变得高了很多。它更多地是低量高利润的那种生意,这意味着卖出的每件货都重要得多。
尽管有着这些不同,基础规则并没有改变。为了确定你能让他们接下来买什么,尽可能地了解客户仍然很重要。要记得顾客并不仅仅是在买包——他们买的是特殊待遇。所以虽然在幕后的算计是一样的,递送必须要优雅有礼得多。

剧透 -   :
The business of luxury goods might seem distant from the mass-market retailing of your standard Stuffer Shack, but the rules of the game aren’t that different. The only difference is that exclusivity becomes a marketable attribute of your product, and the per-unit price of items becomes much more significant. It’s a more low-volume, high-margin type of business, which means each individual sale is that much more important.
Despite those differences, the basic rules don’t change. Knowing as much as possible about the clientele is still important, in order to determine what product you can get them to buy next. Remember that consumers aren’t just buying a handbag—they are buying special treatment. So while the calculations behind the scenes are pretty much the same, the delivery must be far more refined.
值得尊敬的路易威登时尚公司仍然坚决地(有些人会说是顽固地)保留其独家尊享特征,在其他公司已经阵亡的领域活了下来。其他品牌已经带着“在市场中的获利会抵消降低的价格和优越感”的理论,屈服于扩大客户基础的诱惑。不幸的是,这些品牌没能明白那已经低于了特定的优越感阈值,市场只把他们看做定价过高,而没有别的什么。路易威登的领导层从来没有从他们“独家尊享至上”的定位上挪开半步,通过廉价经销店和仅限成员的矩阵站点,回避奢侈品市场清理剩余产品常见的手段。诚然,路易威登摧毁了剩余存货,而非屈尊降低价格清仓。本质上说,路易威登更愿意砍下自己的胳膊,也不愿意(以错的方式)帮顾客一把。
剧透 -   :
The venerable Louis Vuitton house of fashion continues to survive where others have fallen by uncompromisingly—some would say stubbornly—remaining exclusive. Other brands have fallen to the temptation of ever widening their client base, with the theory that the gain in market would offset lowered prices and sense of exclusivity. Unfortunately, what these brands failed to understand is that below a certain exclusivity threshold, the market simply viewed them as overpriced and nothing more. Louis Vuitton’s leadership has never faltered from their position that exclusivity is king, to the point of eschewing the luxury market’s common practice of discreetly liquidating surplus product through outlets and members-only Matrix sites. Indeed, Louis Vuitton destroys surplus inventory, rather than having to stoop to lowering prices and liquidating. In essence, Louis Vuitton would rather cut off their arm than lend (the wrong kind of) consumers a hand.
奢侈品竞争中最凶猛的要数在UCAS的曼哈顿。这里毫无疑问是富人的大本营,在公司中想升迁的人之间的竞争算得上是奥林匹克运动,任何微小的细节都至关重要。合适的西服、领带、礼服裙、手提包或高跟鞋都能让人确认你是个有力竞争者,得认真考虑对待。错误的服装只会让人意识到你是只是在假扮。路易威登曼哈顿店的每名雇员都有6位数薪水,而所有人,从经理到收银员,都是精心挑选的。至少半数是社交修士,而另外一半人可能是凡俗,却在精明上丝毫不减,能够理解他们视为客户的人,巧妙地把他们引导向完美的购物。
剧透 -   :
Nowhere is competition in luxury goods more ferocious than in Manhattan, UCAS. Uncontested citadel of the rich, the competition here between corporate ladder-climbers is an Olympic sport, where every little detail counts. The right suit, tie, dress, handbag, or stilettos identify you as a contender, someone to be seriously considered. The wrong attire merely flags you as a pretender. Every employee of Louis Vuitton’s Manhattan store is paid in the six figures, as everyone, from the manager to the cashier, has been handpicked. At least half are social adepts, with the other half being perhaps mundane but no less shrewd in their capacity to read and subtly guide the cutthroat individuals they count as clients toward the perfect purchase.
员工能够从店的主机里实时获得市场信息。走进店的人会被扫描。主机会先进行微型交易,购买预期顾客的信用值和总体购物习惯。那些信用值低的人要么会被员工忽视,要么会被带到像是钱包或领带这类更小的物品前(这些也仍然价值数百新円)。不过,对任何被标记为推测会感兴趣的预期顾客来说,主机随后会购买详细的购物历史数据,还有详尽的心理侧写。这样的信息不会便宜,会让店投入数百新円,但商店把它当作经营生意的成本吸收掉了。员工已经在售卖和心理学上受过训练,会立刻获得这些信息,知道如何利用它们。一旦启动,档案材料会存储在主机内。
剧透 -   :
The staff is fed live marketing information from the store’s host. Individuals who walk in are scanned. The host first makes a micro-transaction to buy the prospect’s credit score and overall purchasing habits. Those with low scores are either ignored by staff or directed to smaller items like wallets and ties (which still cost hundreds of nuyen). For any prospect that flags as reasonably interesting, however, the host will then buy detailed purchasing historical data, as well as detailed psychological profiles. Such information does not come cheaply, costing the store an investment of several hundred nuyen, but the store absorbs this as a cost of doing business. Staff is instantly fed this information, having been expertly trained in sales and psychology to know exactly how to put it to use. The dossier remains stored in the host once opened.
对于那些更喜欢虚拟体验的顾客来说,路易威登在主公司主机里有一个集中的购物平台,但曼哈顿店(就和公司其他所有分公司一样)也可以单独访问。这一帮助确保忠实顾客能继续感受精品店培养的个人定制、周到上乘的服务关系。就像许多零售公司做的那样,虚拟的路易威登如实呈现了现实中的店面,不过当然,所有东西都更闪闪发光一点。
剧透 -   :
For customers who prefer the virtual experience, Louis Vuitton maintains a centralized shopping platform via the main corporate host, but the Manhattan store (like all branches of the company) can also be visited specifically. This helps ensure loyal customers continue to experience the personalized, white-glove relationship the boutique fosters with its local clients. As is often the case with many retail companies in general, the virtual Louis Vuitton store is a mirror representation of the physical store, though of course everything is a little shinier and polished.

主机等级:6
通常配置:攻击性6,隐匿性7,数据处理8,防火墙9
安保流程:巡逻IC随时运行。并没有蜘蛛监控系统。一旦警报响起,主机会依照以下顺序放出IC:探头、扰乱、追踪、干扰、记号笔和崩溃。如果探头或扰乱IC被砖化,它会用下一个战斗轮重启那个IC,而不是继续到下一个。一名标准安保蜘蛛会在警报响起后{3+1D6}个战斗轮后抵达。
路易威登只使用“白”IC,主要是通过扰乱切断入侵者的连接,和/或追踪入侵者,并且将其报告给权威机构。

剧透 -   :
Security Procedure: Patrol IC running at all times. There are no spiders monitoring the system.
Once alarmed, the host launches IC in this order: Probe, Scramble, Track, Jammer, Marker, and Crash. The system will always reboot Probe and Scramble if they are bricked before continuing down the line. A Standard Security Spider will arrive 3 + 1D6 Combat Turns after the alarm is triggered.
Louis Vuitton uses only “white” IC, focusing mostly on severing intruders’ connections via Scramble and/or Tracing the intruder and reporting them to the authorities.
用途:曼哈顿是行事隐秘巧妙的狂奔者的游乐场,他们知道如何分散地将任务完成。要特别勇敢的骇客才会和本地公司主机跳舞,因为黑IC通常是他们丢在骇客身上的第一件东西。公司猜疑地保护他们的秘密和他们有价值的资产(读作:人)。不过,路易威登的行当是售卖昂贵的漆皮制品,而非保护数据。所以聪明的,跳出固有思维模式的骇客可能会乐于溜进相对容易的路易威登曼哈顿店主机,在里面寻找无主的客户个人信息宝库。某个人(比如说,一个你要挖角的人)之后会在什么地方,可以很好地从他们的消费习惯中推断出来。而且,即便这没能奏效,还有更直接的方式,可以把虚假信息植入在主机中,诱惑目标来到商店——也许可以对“客户忠诚独家尊享商品”动些手脚。
时髦的狂奔者可能也想找办法依照自己的方式改变某些高端时尚元素,不过由于路易威登亲力亲为的工作方式,除非现实中也进行一场骗局,很可能商店人员会注意到矛盾。

剧透 -   :
Uses: Manhattan is the playground of subtle shadowrunners who know how to get things done discretely. It takes an especially brave hacker to tango with the local corporate hosts, as Black IC is usually the first thing that gets thrown at hackers. Corps jealously protect their secrets and their valuable assets (read: people). However, Louis Vuitton is in the business of selling expensive patent leather articles, not protecting data. So clever hackers thinking outside the box may be very pleased indeed at the relative ease of slicing into the Louis Vuitton Manhattan store’s host to find a little treasure trove of personal information on the clientele. A person’s future whereabouts—say, a person you plan to extract—can very well be extrapolated from their shopping habits. And, if that doesn’t work, there is the more direct route of planting false info in the host to lure the mark to the store, perhaps to act upon an “exclusive loyalty offer.”
Fashionable shadowrunners may also look for a way to redirect some top fashion elements their way, though due to Louis Vuitton’s very hands-on approach, it is likely store personnel would notice the discrepancy unless a physical con game is also played out.

研发 R&D

R&D,研究和开发。吸引你的注意了吗?虽然R&D并不是整体市场主机份额的很大一块,但毋庸置疑的是,狂奔者被不成比例地吸引过去。这就是这一行的本质,不是吗?
就像已经说过的其他行业一样,R&D意味着许多事情。它本质上是在寻求更好的赚钱方法,真的。这可能是更好的产品,也可能是更好的售卖方式。每个公司都会进行一些R&D,但这并不真的是我们想找的东西。大多数行业把R&D作为附属品,放在他们的主要主机里。纯粹的研究公司要稀少一点。大学是纯粹研究的好例子,但十大也都有进行纯研究的秘密子公司。问题关键本质上进行纯粹的研发很难赚到钱。大多数公司基本上完全是由其他既有的收入来支持研发。大学获取补助,而且向学生收取学费,而大公司的研发部门花费的是从其他子公司利润中拿来的钱。

剧透 -   :
Research and Development. Got your attention, did I? While R&D is not a significant slice of the overall market share pie for hosts, it is undeniable that shadowrunners find themselves disproportionately drawn to them. It is the nature of the business, innit?
Well, much like the other business sectors so far, R&D can mean a lot of things. It is essentially the pursuit of better ways of making money, really. That can mean better products, or better ways to sell them. Every company does some R&D, but that’s not really what we’re looking at. Most businesses handle their R&D as a side thing, on their main hosts. Pure research corporations are a bit rarer. Universities are a good example of pure research, but all of the Big 10 also have hush-hush subsidiaries that work on pure research. The issue, essentially, is that it isn’t easy making money doing pure R&D. Most companies doing this are pretty much fully supported by some other existing income stream. Universities receive grants and charge tuition to students, while R&D arms of large corporations bleed out the money that comes in from the profit generated by other subsidiaries.
完全从数学角度来看,有个明显的问题是,究竟为什么会有人要让费心去做纯研发?我很确定你们这些狂奔者知道答案。这是因为有时候,研究计划会生产出改变游戏的整个规则的东西。研发导向的是其他人没有的新东西。有些东西比其他产品好了太多,仅凭产品本身就卖得出去。现在,由于竞争者永远紧随在后,这一优势从来不会持续那么久,但在它还持续着的时候,朋友,你就是在印钱啊(呃,公司已经有了字面意义上给自己印钱的能力,但你知道我意思的)。所以就算从算数的角度而言,研发会在一段时间内是个吸钱的大坑,然后突然,“嘭”的一下,你的投资净赚了500倍。
当然,偶尔会有像我们这样的狂奔者带着我们的黑心和我们的爆炸物出现,破坏整个实验室,窃取所有研究数据,还要在能让大家获利甚丰的各种展品上拉屎,但如果他们不想我们这么做,他们就不会方便地忘记查我们的SIN了,对吧?

剧透 -   :
The obvious question, from a purely mathematical point of view, is why the frag would anyone bother doing pure R&D then? As shadowrunners, I’m sure you know the answer. It’s because every now and then, research projects produce game-changers. R&D leads to something new that nobody else has. Something so superior to other products that the things sells itself. Now, that advantage never lasts that long, as competitors are always just one step behind, but while it lasts, chummer, you can print your own money (well, corps already do literally print their own money, but you know what I mean). So in terms of numbers, R&D will be a money sink for a while, and then suddenly, BAM, it nets you a 500-fold return on investment.
Of course, occasionally shadowrunners such as ourselves show up with our little black hearts and our explosives and destroy the whole lab and steal all the research data and shit on everyone’s lucrative parade, but if they didn’t want us doing that, they wouldn’t conveniently forget to issue us SINs, would they?
无论怎样,R&D就和我已经提过的工程部分相似。R&D更偏向于理论。它是指导工程学把东西变为实体的理念。基本来说,R&D是性,而工程则是分娩的部分。
研发主机因此和工程主机很像,尤其是真实的拟感非常重要。如果R&D是基于大量的数据碰撞来推算新点子的话,有时候会有大量的运算处理。主机总是为他们要处理的数据量身定制(没人会用本来为了魔法研究而设的主机来研发新的无人机自驾芯片),而且就像银行金库,它们总是被非常非常严密地保护着。它们里面有价值的数据在我们这个时代里是首要目标,所以你能绝对肯定他们会采取合适的防御措施。R&D主机通常只有很小一群有权限的用户,对安保协议非常熟悉,所以在异常迹象初次出现的时候就烤糊脑子是一个很经常被使用的方式。

剧透 -   :
Anyway, R&D is really quite similar to the Engineering sector I already covered. R&D tends to be a bit more theoretical. It’s the idea that leads to engineering’s efforts to concretely deliver on that. Basically R&D is the sex and engineering is the giving birth part.
R&D hosts thus share a lot with engineering, in that realistic simulations are very important. Large volume processing can sometimes come up, if the R&D is based on crunching a lot of data to extrapolate new ideas. Hosts will always be specialized in the data they are built to deal with (one does not use a host optimized for magical theory research to come up with new drone pilot chips) and, much like bank vaults, will always be very, very securely protected. They contain data of value and are the number one target in our age, so you can bet your hoop they are going to take appropriate defensive measures. R&D hosts typically have a very small pool of authorized users that are intimately familiar with security protocols, so frying someone’s brain at the first sign of deviancy is commonly accepted practice.

引用
十字生物医疗研发站,亚马逊国大都会
CROSS BIOMED R&D SITE, METROPOLE, AMAZONIA


十字生物医疗在几年前被ζ-帝国化学(Zeta-Imperial Chemicals)收购,被怀疑处在超企努力研究CFD相关的第一线。这是一个非常有争议的话题,特别是因为没人清楚为什么ζ-帝化在研究CFD(也许是想治愈它,也许是想把它变为武器),任何对这个主题的研发都要在没人看上去与其关系紧密的地方悄悄进行。对那些把亚马逊国当作反企业顶点的人来说,很让他们惊讶的一点是,大都会(亚马逊国的超级城市)实际上对商业很友好。城市中心区(Centro sector)是大片无人关注的土地,而且它离人才库很近,可以从中吸取雇员,让它成为可能是世界上黑设施最集中的区域,它们全都是在亚马逊国政府的默许合谋(或者至少是容忍)下经营的。
剧透 -   :
Cross Biomed, acquired by Zeta-Imperial Chemicals a few years ago, is suspected to be at the forefront of the megacorp’s research efforts into all things CFD. A highly controversial topic, especially since nobody is clear on why Zeta-ImpChem is researching CFD (maybe to cure it, maybe to weaponize it), any R&D into the subject must be done very quietly where nobody is likely to look too closely. For those who picture Amazonia as the height of everything anti-corp, it may come as a surprise that Metropole, the Amazonian megapolis, is remarkably business-friendly. The Centro sector of the city features nice, large tracts of unobserved land that are still very close to a large talent pool from which to draw employees, making it probably the world’s most concentrated area in terms of black facilities, all operated with the tacit complicity—or at least, tolerance—of the Amazonian government.
十字生物医疗据说是ζ-帝化CFD研究的一手好牌中领头的子公司,据信在中心区通过本地注册的皮包公司经营着一家黑设施。ζ-帝化作为总体而言缺少道德的世界领导者之一,无疑会保护它的秘密计划,所以虽然全世界的检查员和侦探都试图弄清楚事情,搞清楚关系,公司也在趁还能继续的时候加紧干活。如果有破坏出现,公司会简单地关闭设施,在新的重重疑阵下重新设置在其他地方。
剧透 -   :
Cross Biomed is thought to be one of the leading candidate subsidiaries in Zeta-ImpChem’s deck of cards to run CFD research and are suspected of operating a black facility in Centro via a locally registered shell company. Zeta-ImpChem, as one of the world’s leaders in total lack of ethics, is no stranger to protecting its secret projects, so while the inspectors and sleuths of the world try to figure things out and draw lines between the dots, the corporation is blazing ahead while they can. Should a breach occur, the corp will simply close down the facility and relocate somewhere else, under a new web of deceit.
与此同时,十字生物医疗的亚马逊国设施的确进行着CFD的理论研究。被感染的样品被带进来,进行穿刺、解剖和研究。生物危机协议已经生效,而且安保也并非玩笑。公司已经因为没有遵从安全协议,处决了四名自己的员工。设施运行着一个主机,分成几个部分来满足基础管理和站点安全的次级需求。不过,主机里的主要活动是科学家进行的实验和分析结果数据。至于文档服务器,有一个非常活跃的出入登记流程。研究者只用他们需要的文件,而其他的东西都被牢固地锁了起来。
剧透 -   :
For the meantime, Cross Biomed’s Amazonian facility is indeed conducting theoretical research into CFD. Infected specimens are brought in, poked, prodded, dissected, and studied. Biohazard protocols are in full effect, and security is no joke. The corporation has already executed four of its own employees for failure to comply with security protocols. The facility runs a single host, segmented to meet the secondary need of basic administration and site security. However, the main activity in the host are scientists running experiments and analyzing the resulting data. A very vigorous check-in/check-out process is in place with regard to the Archive. Researchers only work with the files they need, everything else being locked away tightly.
主机的VR环境被设计来提醒所有雇员,他们的努力极其严肃。主机呈现为某种地下设施(并非模拟大都会的站点,以免入侵者通过矩阵了解到现实中的建筑布局)。不过,所有的墙都是由某种融化的,柏油一样漆黑的蜡样物质制成的。空气有着灰烬的味道,炽热而浓密。远处,巨大引擎不停轰鸣的声音——更像是对震动的感觉而非听到的声音——创造出持续不断的背景噪音。化身移动时带着粗俗又疯狂的抽搐,让人心烦意乱,他们的脸被医用口罩复盖着,额头上戴着明亮、炫目的灯。这里的氛围显然既不放松也不好客。其理念是创造一种不适感,让所有用户尽可能高效地工作,快速地把事情做完。它同时也阻碍不必要的结交友谊。
剧透 -   :
The host’s VR environment is designed to remind all employees of the seriousness of their endeavors. The host appears as a sort of underground facility (not mirroring the Metropole site, lest intruders learn of the physical layout via the Matrix). However, all the walls are made of a sort of melting, tarry black wax substance. The air smells of ash and is hot and heavy. The sound—more like a vibration felt than heard—of heavy engines constantly humming in the distance creates a constant background noise. Personas move with an obscene and insane jerkiness that troubles the mind, their faces covered with surgical masks with bright, blinding lights attached to their foreheads. The climate is certainly not relaxing nor inviting. The idea is to create a sense of discomfort to make all users work as quickly and efficiently as possible to get things done. It also discourages needless fraternization.
任何不幸到遇到IC的人会在他们的神经元被烤糊之前面对短暂的恐慌。这些主机的保护者表现为恶魔般的生物。他们看上去就像人一样,类似于化身,但旁观者会看到某些别的东西的闪影:满是鲜血的面孔惊声尖叫,爆裂燃烧着的皮肤中渗出黑油。这闪影一闪而过,景象又会复归正常的化身,让你疑惑是不是你的脑子里出现了幻觉,但你越不想相信,你就越会看到它。这股令人不安,毛骨悚然的疯狂之后,致命IC就会烧掉你的神经元。
剧透 -   :
Anyone who has the misfortune of meeting IC will face short-lived horror before their neurons fry. The protectors of the host manifest as demonic creatures. They appear just as people, similar to personas, but onlookers will see flashes of something else: bloody screaming broken faces that ooze black oil out of cracked burnt skin. As quickly as the flashes appear, the sight is restored to normal personas, making you wonder if your mind is playing tricks, but the more you want to disbelieve, the more you see it. A disturbing, creeping madness right before the lethal IC burns your neurons out.

主机等级:10
通常配置:攻击性12,隐匿性11,数据处理10,防火墙13
安保流程:巡逻IC随时运行。两名标准安保蜘蛛随时监控系统。一旦警报响起,主机会依照以下顺序放出IC:黑IC、探头、电椅、记号笔、冲击波、杀手、蚀甲、追踪、木马和崩溃。如果探头或扰乱IC被砖化,它会用下一个战斗轮重启那个IC,而不是继续到下一个。两名安保处理专家会在警报响起后{1D6 / 2,向上取整}个战斗轮后抵达。安保处理专家会评定状况,可能会命令主机运行不同的IC。处理专家也有权力关闭主机,而且如果入侵者就要窃取关于CFD研究的敏感信息,他们不会对此犹豫。不过,关闭主机是件大事,所以只要处理专家相信他们能控制威胁,他们就不会这么做。
所有的安保力量都会试图彻底杀死入侵者。作为次要的措施,他们会试图追踪那名用户。如果他们成功,会派出私人佣兵(很可能是其他狂奔者),命令追踪并且逮捕或者杀死骇客。这个小队在任务完成之前不会停止追猎骇客。

剧透 -   :
Security Procedure: Patrol IC running at all times. There are two Standard Security Spider monitoring the system at all times.
Once alarmed, the host launches IC in this order: Black IC, Probe, Sparky, Marker, Blaster, Killer, Acid, Track, Binder, and Crash. If one of its IC gets bricked, it will use the next Combat Turn to reboot that IC rather than moving on to the next one. Two Security Troubleshooters will arrive (1D6 / 2, rounded up) Combat Turns after an alarm is triggered. The Security Troubleshooters will assess the situation and may instruct the Host to launch different IC. The Troubleshooters also have the power to shut down the Host, which they will not hesitate to do if it appears the intruders are on the verge of stealing sensitive data regarding the CFD research. Shutting down the host is a big deal, however, so the Troubleshooters will not do so if they believe they can contain the threat.
All security efforts will be directed toward killing the intruder outright. As a secondary measure, they will seek to trace the user. Should they succeed, private mercenaries (most likely other shadowrunners) will be sent with the orders to hunt down and capture or kill the hacker. The kick squad will not stop hunting the hacker until the mission is achieved.
用途:无数对CFD感兴趣的顶级组织(特别是三津滨、新网、联络和天演)会花费任何代价了解ζ帝化在他们的黑设施里做什么。问题并非花多少钱在行动上,而是找到那些愿意,而且更重要地,能够突破设施可怕的防御,好好瞥一眼设施内部的人才。甚至还有ζ帝化内部的势力认为对CFD的研究是自找麻烦,想要在外人戳出个孔,瞥一眼里面之前,让计划和设施搁浅。对CFD的公众煽动让这样的研究变得太过危险,即便是对ζ帝化这样狂热的企业来说也一样。内部的破坏者可能希望用尽可能多的的内部信息帮助狂奔者,把他们送进去,创造一次足够重要的破坏,致使计划实施其自毁规定。
在任何情况下,只有对自己的技能有着非凡自信的人会接活,不过足以购买德尔塔品级的3级跳线反射的薪水足以吸引愚者伸出手来。

剧透 -   :
Uses: Any number of top-tier parties with interest in CFD—notably Mitsuhama, NeoNET, Renraku, and Evo—would pay whatever it takes to know what Zeta-ImpChem is up to in their black facility. The problem is not so much funding the operation, but finding talent willing and, far more importantly, able to overcome the facility’s formidable defenses to take a solid peek inside. There are even factions within Zeta- ImpChem that think research into CFD is just asking for trouble and would like to see the project and facility scuttled before any outsiders tear a hole in to take a peek. Public agitation over CFD makes such research too dangerous, even for a fierce corporation like Zeta-ImpChem. Inside detractors may wish to arm shadowrunners with as much inside info as possible and send them in to create a breach of sufficient importance to cause the project’s self-destruct protocols to engage.
In any case, only shadowrunner teams formidably confident of their skill level should apply, though a paycheck for enough nuyen to buy deltaware wired reflexes III is certainly going to tempt the hand of the foolish.
« 上次编辑: 2018-06-14, 周四 15:09:20 由 妖猫 »




离线 妖猫

  • Hero
  • ****
  • 帖子数: 635
  • 苹果币: 3
Re: 【DT】完美主机 THE PERFECT HOST P82-105
« 回帖 #8 于: 2018-06-13, 周三 16:15:39 »
制造业 MANUFACTURING

世界上有许多制造商,这很好,因为他们制造我们使用的一切。杯子是制造出来的。鞋是制造出来的。衬衫、汽车、通讯链、帽子、台灯和枪都是制造出来的。一切都是制造出来的。所以,很明显,你能明白制造业是个庞大的部分。这个领域中联合程度并没有那么高。有着数百万的制造商,或大或小。有些每月只能生产几千单位的产品,而有些每秒就能生产这么多。
剧透 -   :
There are a lot of manufacturers in the world, which is good, because they make everything we use. Cups are manufactured. Shoes are manufactured. Shirts, cars, commlinks, hats, lamps, and guns are manufactured. Everything is manufactured. So, clearly, you’ll get the picture that the manufacturing sector is a huge sector. It is an area where there certainly isn’t much consolidation. There are millions of manufacturers out there, big and small. Some output a few thousand units a month, other output that much per second.
对制造商来说值得庆幸的是,他们的生意和彼此之间并没有多大差别。这让即便是小商店也相对能承受得起购买矩阵主机的支出,从而用它经营自己的生意。其他的东西就只是缩放而已。小制造商所做的事情不会和大型超企制造商真的有什么差别——只是速度和数量改变了。
制造商最适于逐步转变式加工(sequential transformation processes),因为自福特生产出T型车之后,它就没怎么变过。制作东西最好的方式就是把它拆碎成装配阶段,慢慢地拼起来。

剧透 -   :
Thankfully for manufacturers, their businesses don’t differ that much from one another. This makes it relatively affordable for even smaller shops to purchase the Matrix hosts they need to run their businesses. Everything else is just scaling. A small manufacturer isn’t doing anything really different than a huge megacorporate manufacturer—it’s just the speed and scale of the numbers that changes.
Manufacturers are the prime candidates for sequential transformation processes, as not much has changed since Ford came up with the Model T. The best way to build something is to break it down into assembly stages and slowly build it up.
制造商通常专注于管理他们的供应链条和制作流程,其中最重要的是保证流程正确。这类主机并不会具有高端技术。他们只需要一些能把事情弄好的东西,并且追踪那些弄好的事情。
制造商的长处是他们的坚固性。他们很难被破坏。如果他们的主机关闭几个小时,这当然会影响到他们的利润,但这不会杀死他们。即便有信息丢失也不是大事,因为这只是在他们的数据中创造了盲点,这只会被用于财务和管理报告,而即便缺少了数据,它们也还能完成。人们总是需要担心,所以只要你制造出适合的东西,甚至是人们有点想要的东西,钱就会不断地渐渐流进来。

剧透 -   :
Manufacturers are typically focused on managing their supply chains and build processes, where being correct and doing things right are the primary concerns. These types of hosts aren’t going to be at the cutting edge of the SOTA. They just need something to get things done, and track the things that are getting done.
The strength of manufacturers is their robustness. They are hard to disrupt. If their hosts go down for a few hours, it will certainly affect their bottom line, but it won’t kill them. Even the loss of information is not that big a deal, as it just creates a certain blind spot in their data, which is used for accounting and management reporting, but those things can survive data loss. People will always need things, and so long as you build the right thing, something that is even moderately desirable, the money will continue to trickle in.
讽刺的是,在过去,恰恰是平均、稳定、看上去无可阻挡的商业洪流造成了制造业的问题,因为工人们联合在一起,强迫公司给他们想要的东西,否则他们就会放下工具。外部市场的力量相比于内部他们的人(或者是他们的贪婪,取决于你站在罢工警戒线的哪一边)来说,并不对制造商构成那么大的问题。当然,如今问题差不多被解决了,因为所有类似于公平劳动法的东西都差不多被废弃了,通过全自动流程和芯片劳动力创造出的可换可抛劳动力严重冲击了工会和工人。公司基本上把雇佣真人作为慷慨之举,或者更准确地说,是服务自己的慷慨之举,因为政府会为公司雇佣其公民而提供补贴。顺便,这就是制造业主机的另一种用途:控制芯片劳动力。他们的技能闭路是由主机中的数据流提供支持的。
这并非什么好看的生意,但它无处不在,让世界保持运转。世上不可能都是迷人的超级机密设施。

剧透 -   :
Ironically, in the past it was this even, steady, and seemingly unstoppable flow of business that caused problems for manufacturers, as workers banded together to strong-arm the company into paying them what they demanded, or they would put down tools. External market forces weren’t so much the problem for manufacturers as it was their own people—or their own greed, depending on which side of the picket line you stood on. Of course, nowadays, that problem has largely been resolved by the near abolition of anything resembling fair labor laws, and unions and workers have been crushed by the creation of imminently replaceable and disposable labor via fully automated processes and chipped workforces. Corporations basically hire actual people as an act of generosity, or more precisely an act of self-serving generosity, as governments subsidize corporations for doing them the favor of employing their citizens. Incidentally, that’s another use of manufacturing hosts—they control the chipped laborers, their skillwires being fed by streaming data from the host.
It’s not a pretty business, but it’s everywhere and it makes the world go round. It can’t all be glamorous super-secret facilities.

引用
布鲁姆与沃斯股份有限公司汉堡船坞
BLOHM & VOSS GMBH HAMBURG SHIPYARDS


有时候,制造业缓慢而稳定,低价小部件构成的洪流被无可阻挡地生产出来。有时候每件商品都加值数百万新円。造船业(和航天工业)就属于后者。他们仍然是制造业,只是每件商品都自成大计划。建造的每艘船都经过数千个步骤,有数千人参与其中。有很多地方可能出错,而且都会损害毛利率。布鲁姆与沃斯是一家属于联络的大型工业企业集团,(除了别的之外)它在汉堡城建造船只。就像所有制造业一样(或者说就像所有公司一样),他们的主机协助其确保持续盈利。
剧透 -   :
Sometimes manufacturing is slow and steady, a stream of lowvalue widgets inexorably being produced. Sometimes each individual unit is worth millions of nuyen. The shipbuilding (and aerospace) industry fit this latter model. They are indeed still manufacturing, just that each individual unit produced is a large project in itself. Each ship built goes through thousands of steps involving thousands of people. A lot can go wrong, and everything that does erodes the profit margin. Blohm & Voss is a large industrial conglomerate belonging to Renraku, which (among other things) builds ships out of the city of Hamburg. Like all manufacturers (or like all corporations, rather), their host helps ensure continued profitability.
航海工业(aeronautic industry)类似于航天工业:全是大订单。买家(物流企业、军方、海上油气提取机等等)可能会订购一艘或几艘船。每艘都至少价值5千万新円,不过对于最大或最复杂的船来说,价格会翻到两倍甚至三倍。布鲁姆与沃斯自从十九世纪就在汉堡造船,仍然以稳固的步伐干着这行。由于交易涉及的金额如此巨大,肯定有很多人想要插上一脚。工业间谍是危险的造船行业中无法改变的事实。竞争者竞标同一个合同,雇佣狂奔者刺探彼此,试着弄清投标书的细节。行业中有些潜规则,虽然可以进行间谍活动,但不能使用暴力。欧洲的造船业都彼此认识,不断地试图以策略胜过对方,但这是私下的事务。公众,或者更糟,客户永远不应该面对那些纷飞的匕首。暴力,无论是用作威胁、暗杀,还是在偷窃的过程之中犯下,都违反了这条一致同意的潜规则。当然,这一规则是单向的。这行里禁止为了获取情报而犯下暴行。但为了保护秘密而对间谍使用暴力,就完美地可以接受。
译注:aeronautic其实是航空……但从前后文来看,怎么看也应该是航海

剧透 -   :
The aeronautic industry is similar to the aerospace industry: It’s all about big contracts. Buyers—logistics corporations, militaries, offshore oil and gas extractors, etc.—may place an order for one or several ships. Each one is worth at least fifty million nuyen, though the price tag can go up to twice or even three times that for the largest or most sophisticated vessels. Blohm & Voss has been making ships out of Hamburg since the nineteenth century and still continues to do so at a steady pace. As deals are worth so much, there is plenty of muscling around them. Industrial espionage is a fact of life in the rough shipwright business. Competitors bidding on the same contracts employ shadowrunners to spy on one another and attempt to ascertain the details of each other’s proposals. The business works on a sort of unspoken rule that while espionage is expected, violence is not. The shipwrights of Europe all know one another and constantly seek to outmaneuver each other, but it is a private affair. Never should the public or, even worse, the client, be exposed to the knives flying back and forth. Violence, whether employed as intimidation, assassination, or in the course of theft, is against this unspoken agreement. Of course, this rule is unidirectional. Perpetrating violence in an effort to gain intelligence is forbidden. Perpetrating violence against a spy in order to protect secrets is perfectly acceptable.
显然,骇客在造船市场中起着重要的作用。虽然狂奔经常需要骇客,工作范围包括从目标通讯链里找文件、窃听通话等等,有时候行动需要直接进入主机。布鲁姆与沃斯的公司主机被用于所有你能想到的典型行政管理事务,但它的主要目的是管理建造和船只的维护。
这家公司并不以创新闻名,雇了一家本地企业设计其主机的塑模。这里并没有多少灵活度,因为每艘正在建造或提供服务的船都需要对其单独的项目进行管理,而每艘船都需要基本上能在虚拟空间中访问到。简单地为了让这里和现实(船坞、码头和船只)的精准复制品有些差别,设计者使用了科幻风格,造船厂是宇宙空间站,而船只是宇宙飞船。

剧透 -   :
Obviously, hackers play a big part in the shipbuilding market. While often runs involve getting a hacker within operational range of a target’s commlink to pull files, listen in on calls, and that sort of thing, sometimes the action needs to go straight into the hosts. Blohm & Voss’ corporate host is used for all the typical administrative stuff one might expect, but its main purpose is to manage the construction and maintenance of ships and other vessels.
The corporation, not known for its inventiveness, hired a local firm to design the sculpting of their host. There wasn’t much wiggle room, as each vessel being built or serviced needed to be managed as its own project, and each vessel needed to basically be available to visit in the virtual space. Simply in order to have something different from an exact replica of reality—shipyards, docks, and ships—the designers went sci-fi and decided that the dockyards would be a highorbit space station and the ships would be spaceships.
所以,里面的虚拟现实几乎就是造船厂的现实复制品——在太空中的版本。每艘船视觉上都呈现为某种工业的哥特式船只,大概接近于现实世界中的船。不过,每艘船的内部都是准确的。用户可以上船参观。不过,要记住,关于船的一切都是保密信息,没有恰当授权的用户无法获得。有恰当通行证的访客和没有任何许可的访客会看到两艘完全不同的船。没有通行证的用户无法看到船只的任何零件,无法调出详尽的工程和程序报告文件。而有恰当许可的用户(比如项目经理、工程师等等)能够来到船上,在进程中一直保持信息通畅。用户可以穿上宇航服到外面看看,也可以乘坐小型穿梭机出去。当然,真空环境是虚拟的,设计时就不是有害的。用户完全可以光着身子走到外面,也不会感到难受。
剧透 -   :
And so, the virtual reality is a near-real-world replica of the shipyards … in space. Each ship renders visually as a sort of industrial, gothic ship generally approximating the real-world vessel. The interior of each ship is, however, exact. Users can get onboard and visit the entire ship. Note, though, that pretty much everything about the ship is confidential information and is hidden from users lacking proper authorization. A user with proper clearance and a visitor without any permissions will see two vastly different ships. Users lacking clearance will fail to see many components of the ship and will be unable to call up detailed engineering and progress report files. Users with proper permissions (i.e., project managers, engineers, etc.) can for their part visit the ships and stay informed on progress. Users can go observe the outside by donning space suits and going on space walks, or observe from a small shuttle. Of course, the vacuum environment is virtual and not designed to be harmful. Users very well could walk outside naked and suffer no ill effect.
空间站还有许多有趣的地方,作为生意的办公室区域。空间站中特别让人感兴趣的是销售数据。销售人员把主机当作从始至终的主要管理和计算销售机会的工具。关于数百万新円的赚钱交易的信息宝藏就打包藏在里面。理论上说,对于没有在使用的数据有着严格的文档管理政策,但就和大多数生意一样,销售人员没法只做和他们销售活动严格相关的事情,因此关于安保程序的玩忽职守很常发生。敏感文件在无论如何都应该在文档服务器里的时候,却仍然被调出来放在主机里。不过,至少它们都是被加密过的。
布鲁姆与沃斯科幻主机里的IC看上去就像1970年代想象的那种几乎滑稽的太空警卫,穿着黑色氨纶弹力服,戴着巨大的白色头盔,手里握着傻兮兮(但有效)的激光枪。不只一个骇客曾经在安保烤焦他的脑子之前笑到昏迷。无论看上去傻不傻,IC可不是来交朋友的。

剧透 -   :
The space station itself also contains a number of points of interest, acting as back-office for the business. Of particular interest in the space station are any and all sales data. The sales staff use the host as their main tool for managing and working sales opportunities from beginning to closure. A treasure trove of information with regard to lucrative multi-million-nuyen deals is thus packed away in data files here. A strict archiving policy on sales data not in use is theoretically in effect, but as is mostly true in every business, the sales staff cannot be made to do anything not strictly related to their sales activity, and thus truancy about the security procedure is very high. Sensitive files remain called up in the host when they should by all means be in the archive. They are, at least, all encrypted.
IC in the Blohm & Voss sci-fi host appears as almost-comical 1970s-imagined space guards wearing black spandex and big white helmets, wielding silly (but effective) laser rifles. More than one hacker has laughed himself into a coma as security fried his neurons. Silly-looking or not, the IC isn’t there to make friends.

主机等级:8
通常配置:攻击性10,隐匿性8,数据处理9,防火墙11
安保流程:巡逻IC随时运行。两名标准安保蜘蛛随时监控系统,其中一名监控造船所,另一名监控所有销售数据。一旦警报响起,主机会依照以下顺序放出IC:探头、扰乱、杀手、木马、蚀甲、冲击波、记号笔和电椅。如果其中一个IC被砖化,它会在重启任何IC之前沿着顺序继续下去。两名额外的标准安保蜘蛛会在警报响起后{3+1D6 }个战斗轮后抵达。

剧透 -   :
Security Procedure: Patrol IC running at all times. There are two Standard Security Spider monitoring the system at all times. One specifically monitors the dockyards, while the other monitors all Sales data.
Once alarmed, the Host launches IC in this order: Probe, Scramble, Killer, Binder, Acid, Blaster, Marker, and Sparky. If one of its IC gets bricked, it will continue down the line rather than reboot the IC. Two additional Standard Security Spiders will arrive (3 + 1D6) Combat Turns after an alarm is triggered.
用途:布鲁姆与沃斯的主机是许多行动的目标。竞争对手可能会为了多种目的,让骇客渗透进去。窃取数据非常常见。竞争对手会对几乎所有事情都感兴趣,包括生产中船的程序状态、船内安装的零件细节、销售计划的情报(特别是定价细节)等等。任何东西都很有用,即使是最小的一块数据也可以让竞争对手调整自己合同的投标出价,从而把B&V淘汰出局。
更激进的对手可能会想真的破坏生产。接入工人的技能闭路,引入制造缺陷是一个途径,但另一种办法是巧妙地改变计划,在特定位置使用有缺陷的设备或材料,可以以后利用这点。这样的破坏也可以是为了支援物理行动。雇现场小队来把追踪或窃听恶意软件放到电子元件中同样需要在线入侵该改变规格数据,让修改能在质检阶段不被查出来。

剧透 -   :
Uses: Blohm & Voss’ host is the target of a lot of action. Rival corporations may want hackers to infiltrate it for a number of reasons. Data theft is very likely. Rivals would be interested in almost everything, including the progress status of ships in production, the details of components installed in ships, sales proposals information (especially pricing details), and so on. Everything and anything is of interest, as even the slightest piece of data would allow a competitor to adjust his own bid on a contract in such a way to out-compete B&V.
More aggressive rivals may wish to actually cause sabotage to production. Accessing worker skillwires to introduce manufacturing defects is one way, but so is changing the plans subtly to include defective devices or materials in specific areas that can later be exploited. Such sabotage can also be made in support of physical activity. An on-site team hired to introduce tracking or listening malware into electronic components might also require an online invasion to change specifications, to allow the modification to remain undetected during quality assurance stages.

物流和分销 DISTRIBUTION & LOGISTICS

物流和分销是制造业和零售业的永恒伙伴。制造商品的人通常并不负责把它送到人们手中,而大多数零售商对建立和管理数十数百的厂房来为货架上货也毫无兴趣。这就是物流和分销好伙伴出场的时候了。坦白说这两者是完全不同的行业,但我猜我把它们放在一块只是因为我是个懒蛋。无论如何,分销商通常在仓库里工作。他们接触大量不同的制造商,和后者达成采购协议。他们大量购入,提供人们所说的“规模经济”。由于他们买了很多,制造商愿意通融一下,降低价格。分销商随后转过头,联系零售商,达成简单的交易,让他们轻轻松松就能把货弄到自己的店里。商店乐于如此,因为他们能够保证自己的货架是满的;分销商也很开心,因为他们的卖价比买价更高。他们的行业实质上是关系管理(一边是制造商,一边是零售商)加上一点供应链的头痛事。有些愤世嫉俗的人会说分销商实际上只是中间人,除了抬高价格之外什么都没干,但分销商是通过给压榨已经靠微薄利益经营的制造商来赚钱的,而零售商又会反过来压榨分销商。某种程度上说,做分销商要比其他的活容易很多,因为它不怎么需要真正的技术。你只是从一个人手里买东西,转手卖给别人。因此,市场里挤满了分销商,每天都有许多人入行和破产。
剧透 -   :
Distribution and logistics are manufacturing and retail’s eternal companion. The people who make stuff are generally not really in the business of getting it in the hands of people, while most retailers are not interested in the work of building and managing stables of dozens to hundreds of factories to stock their shelves. That’s where distributors and logistics companies come in. The two are frankly completely different businesses, but I guess I’m lumping them together for no other reason here than I’m a lazy git. Anyway, distributors are basically the warehouse guys. They get in touch with a whole slew of different manufacturers and strike purchasing agreements with them. They buy in bulk, affording what’s called economy of scale. Because they buy a lot, manufacturers are willing to cut them some slack and reduce prices. The distributors then turn around, contact retailers, and make them very simple deals where they’ll get the stuff in their stores without any headaches. The store is happy because they can ensure their shelves are filled and the distributor is happy because they sell for more than they buy. Their business is really relationship management (manufacturer to one side, retailer on the other) mixed with a little bit of supply chain headache. Some cynics will say that distributors are just middlemen who do nothing but jack up the prices of goods, but distributors have the shitty job of making a nuyen by trying to squeeze manufacturers that are already operating on razor-thin margins while retailers squeeze the distributor in turn. In a way, it’s a lot easier to be a distributor than anything else, as it requires little true skill. You just buy from one guy and sell it to the other. As such, the market is crowded with distributors, and many go in and out of business every day

如果你缺乏道德感,在这一行中获取先机的一种方式就是诉诸暴力。分销行业充满阴影,可能会非常致命。新入行的经常被吓出去。已经在市场里立稳脚跟的玩家经常会以彼此为目标,但他们会立刻密切合作,把新来的扼杀在萌芽之中。而且我也并不只是在说他们使用的商业活动。低端的分销商可能会雇佣有组织犯罪(在他们自己并非有组织犯罪的情况下)来殴打、威吓、烧毁或完全杀死竞争对手。卑鄙的人。分销商的主机因此非常简单,主要关于什么货物都在哪里,而它们又定的是什么价格。保持货物记录是关键,因为所有人总会对彼此撒谎,试图毁掉他们。你得能把签好字的合同甩到他们脸上,不然谈好的价格就只会被高兴地忽略掉。这一行就是这样的。就像制造业,这里没有大而复杂的主机,不过在这些家伙把货运进来运出去的同时,了解到你究竟有多少物件,也是相当的挑战。
剧透 -   :
One way to get ahead in the business, if you lack ethics, is to resort to violence. Distribution is rife with shadiness and can be very cutthroat. Newcomers are often intimidated out of the business. Established players in a market regularly target each other, but they will instantly close rank to nip in the bud any newcomers. And I’m not just talking about the business practices they use, either. Lower-end distributors may resort to hiring organized crime (that is, unless they are organized crime) to beat, intimidate, burn down, or outright kill the competition. Nasty people. The hosts of distributors are thus pretty simple, focusing mainly of what goods are where, and what is the pricing agreed upon with whom. Good record-keeping is key, because everyone always lies to everyone and attempts to screw them over. You have to be able to shove signed contracts in their faces, otherwise agreed-upon pricing will be gleefully ignored. That’s just how this business works. Much like manufacturing, we’re not talking about very large or complex hosts here, thought the business of knowing exactly how many widgets you have, at the speed these guys get stuff in and out, is quite a challenge.
物流业在制造商、分销商、零售商和消费者之间运输商品。在两部分之间的距离越大,就越可能出错,因此如果做好,获得的利益就越大。在大陆间越洋航运的超级货轮显然赚的最多,但“暂时小问题”很容易出现,造成货物的部分或整体损失。他们就是要确保货物完完整整地及时到达。在第六纪,这一点说着可比做着容易多了。无法预料的天气会延迟船只,而巨大的海岛大小的海怪可能会决定拿你的船当零食。再加上地缘政治不稳定,你就有许多头疼事要对付。旅途越短,预支付的报酬和风险都会急剧缩小。城市内的配送货车基本上是大批量经营,每趟只净赚一点钱。不过,无论如何,物流公司经营的主机需要非常复杂的算法和组织。由于要输入尽可能多的因素(天气、载具状况、政治风险、巨大海怪等等),来计算最佳路程。最大的问题往往是回程。选择获利最大的路线、把载具塞到最大载货量、用最快的速度卸货是一码事——现在用完全不同的客户和状况来算算回程路吧。这一领域中最顶尖的玩家(咳,五行,咳)纳入考量的因素之多令人震惊,有着特别庞大而多样的客户基础,使得他们的货运载具随时满载。和无聊老旧的分销业不同,这一非凡的数据处理能力需要相当巨大的主机运算力。
剧透 -   :
Logistics are the people who move the goods between manufacturers, distributors, retailers and consumers. The greater the distance between the parties, the more can go wrong and thus the more profit there is in getting it right. Overseas carriers operating superfreighters between the continents stand to make the most, but “hiccups” can occur pretty easily, causing the partial or total loss of cargo. Their game is to make sure cargo arrives on time and with all the bits and pieces it left with. This is easier said than done in the Sixth World. Unpredictable weather can delay ships, while a giant fucking sea monster the size of island can decide to snack on your boat. Add to that geo-political instability and you’ve got plenty of massive headaches to go around. The per-trip reward and risk increasingly narrows the shorter the trip is. Inner-city delivery trucks are basically operating on a high-volume basis, because each trips nets only a few bucks. However, in all cases, the hosts that logistics companies run require very complex algorithms and organization. As many factors as possible are fed in—weather, condition of vehicles, political risks, giant fucking sea monsters, etc.—in order to calculate the most optimal trip. The big killer is usually the return trip. Factoring the most profitable route that fills your vehicle to the highest capacity and unloads it at the fastest speed is one thing—now calculate the same on the way back, with an entirely different set of customers and conditions. The top-tier players in this field (cough Wuxing cough) consider an astounding number of factors and have incredibly large and versatile client bases that allow them to pretty much have their freight vehicles filled at capacity all the time. It’s an insane feat of data crunching that, unlike boring old distribution, requires some pretty hefty host power.

引用
五行全球船运,伦敦办事处
WUXING WORLDWIDE SHIPPING, LONDON OFFICES 


作为世上第一的物流公司,也是五行帝国的冠上明珠,五行全球船运是一家严密掌舵的公司。伦敦办事处负责追踪复盖全北欧的海陆空货运物流。公司雇佣了一群物流工程师来制定路线、一群销售代理来处理航运交易,一群会计和精算师来和保险和银行保持联系,还有大量其他后勤员工。五行全球船运还雇佣了一些雇佣兵“探子”,盯着任何可能会影响交通路线的东西(从怪异恶劣的天气到海盗)。这些现场代理人/线人可以登录进五行全球船运的主机,接入数据中介(data brokerage)算法,出售他们拥有的信息。只有在不同寻常的条件下,线人才需要和真人交流。系统基本上会实时确定情报会影响到什么船运路线,以及由于这些情报,五行公司会节省多少新円。一旦信息从其他来源得到证实,主机随后会付给用户一小部分钱。当然,由于五行的每条路线都运输着数十亿新円价值的货物,可以节省一小时的情报也值不少新円,所以有些天分不错又思维敏捷的自由业者就会靠寻找情报赏金,报告状况等等来讨生活。当然,挣得最多的代理人是冒险最大的。通知五行其货物即将遭受海盗、竞争对手,甚至是对特定运送货物感兴趣的第三方的袭击,都可以拿到不少钱。虽然这会树立一些危险的敌人,但你也在五行里结交了重要的朋友。他们会严肃对待这些事情,因为任何对货物的攻击都是对五行本身的攻击。
剧透 -   :
The premier logistics company in the world and crown jewel of the Wuxing empire, Wuxing Worldwide Shipping runs a tight ship (pun intended). The London offices are in charge of charting logistics for land, air, and maritime freight covering all of northern Europe. The firm employs an army of logistical engineers to map routes, sales agents to bring in shipping deals, accountants and actuaries to liaise with insurers and bankers, and a slew of other supporting staff. Wuxing Worldwide Shipping also hires a number of freelance “scouts,” keeping an eye on anything that might affect transport routes, from freak inclement weather to pirates. These field agents/informers can log into the Wuxing Worldwide Shipping host to access data brokerage algorithms and sell the information they have. Only under unusual circumstances do informers need to speak to actual people. The host is normally able to fairly assess the value of the data and pay out the bounty to the informer. The system basically determines, in real-time, what shipping routes the information affects and the amount of nuyen saved by Wuxing thanks to the information. The host then pays a small percentage to the user once the information can be verified by other sources. Of course, as Wuxing transports billions of nuyen worth of goods on any given route, information that saves even an hour is worth a couple of nuyen, so some talented and nimble freelancers are able to make a living looking for information bounties, reporting on conditions, and so forth. The most lucrative agents are, of course, the ones risking the most. Informing Wuxing of any impending attack on its shipments from pirates or rivals, or even third parties interested in specific cargo being delivered, can bring in good money. While making some dangerous enemies. But you get an important friend in Wuxing, who takes these things seriously, as any attack on its cargo is an attack on Wuxing itself.
五行全球船运的主机在虚拟现实中呈现为某种森林。这会让第一次进来的用户有些困惑,因为他们出现在的这个森林里,树木是由某种玻璃或金属样的物质构成,有着煤灰色、黑色或海军色。叶子是有机的,但颜色是深红色、紫罗兰色和白色。直到访客们凑近观察,他们可能都会一直在想要如何在一片森林中找到装载货物的信息。每棵树上的每片叶子是一份装货。这是设计者想出的,用数百万数据点表现数百万正在运输中的货物的最佳比拟。更仔细地观察的用户会看到铭刻在叶脉中关于货物的数据,像是货物细节、速度、方向、状态等等。用户可以向发条鸟和机器松鼠询问,它们会把用户领到要去的货物那里,在它们疾蹿的时候能看得到它们关节处的齿轮转动。可以看到调度员把黑色大理石种子种进肥沃的黑土中,很快就从幼苗长成了成熟的巨树,以实时匹配上配送进程的速度。化身表现为接近赤裸的部族成员,身体上涂满了肥沃湿润的黑土,装饰着几何图案的纹身,和无机环境有着鲜明的反差:他们是昏暗的森林中唯一有血有肉、色彩缤纷的东西。
剧透 -   :
The Wuxing Worldwide Shipping host renders its virtual reality as a sort of forest. This is confusing to first-time users, as they appear in a forest where trees are made of a sort of glassy or metallic substance that is coal grey, black, or navy in color. Leaves are organic, but with colors running in the crimsons, violets, and whites. Visitors may wonder how they are supposed to find any shipping information in the middle of a forest until they start looking more closely. Every single leaf of every tree is a shipment. This was the best metaphor designers could figure out to represent the millions of data points representing the millions of active shipments in transit. Users observing more closely will see, inscribed in the veins of the leaves, data pertaining to the shipment, such as cargo details, speed, direction, conditions, etc. Everything tracked can be accessed. Each leaf is a package going somewhere. Clockwork bird and squirrel automatons, the gears in the joints visibly working as they scurry around, can be queried to lead the user to any shipment requested. Dispatchers can be seen planting little black marble seeds into the rich black earth, which quickly grow from saplings to giant mature trees, matching the real-time pace of the delivery’s progress. Personas appear as near-naked tribals, bodies stained with the rich, moist black soil and decorated with geometric tattoos, organically at odds with the inorganic environment; the sole fleshy, colorful things in the somber forest.
来到主机出售情报的自由从业者在树干上用白色水粉画上复杂难解的图案,嘴里还念念有词。如果主机获得了情报,图案会被吸收进树干玻璃一样的表面,重新浮现出精确蚀刻的线条。如果主机能够得到现场证明情报,核实过程可以几乎即时进行,但有些线索(比如即将发生的攻击)可能需要数小时或数天来核实。如果蚀刻画出现,出售线索的化身就会获得一个相似图案的纹身。专业、成功的线人因此看上去就像是性情乖戾的萨满,他们的身体被毫米厚的复杂图案复盖着。
对付未授权闯入者的IC呈现为从森林荫隙间天空中砸下的巨手,伸长了去抓入侵者,试图压扁或横扫过去。尽管神之手有着巨大的面积,手指却灵活而精准,用巨大的手指使劲一压,就把闯入者压扁在肥沃的土壤里,什么都不剩。

剧透 -   :
The freelancers coming to sell information paint intricate designs in white gouache on the tree trunks, muttering incantations as they do. If the host accepts the information, the paint is absorbed into the glassy surface of the tree trunk and reappears as precisely carved etched lines. The verification process can occur almost in real time if the host is able access live corroborating information, but some tips (such as impending attacks) can take hours or even days to verify. If the etching appears, the persona that sold the tip gains a similarly patterned tattoo. Professional, successful informants thus appear as gnarled shamans, their bodies covered in millimeter-thin intricate patterns.
IC triggered to deal with unauthorized intruders appears as giant hands crashing down from the firmament beyond the canopy of the forest, reaching to grab, crush, or sweep aside intruders. Despite the massive proportion of the god-hands, the fingers are nimble and precise, squishing intruders to pasty nothingness in the rich soil with a press of massive digits.
 

主机等级:8
通常配置:攻击性8,隐匿性9,数据处理11,防火墙10
安保流程:巡逻IC随时运行。一旦警报响起,主机会依照以下顺序放出IC:探头、杀手、蚀甲、记号笔、石弩、追踪、干扰和冲击波。如果探头和杀手IC被砖化,它会先重启这两个,但除此之外则会在重启任何IC之前沿着顺序继续下去。两名额外的安保处理专家会在警报响起后{1D6 / 2,向上取整}个战斗轮后抵达。安保处理专家会评定状况,可能会命令主机运行不同的IC。如果可能的话,安保处理专家会试图弄清入侵者感兴趣的数据是什么,但摆脱入侵者是首要目标。除非入侵者先使用致命武力,安保处理专家不会采取致命手段。

剧透 -   :
Security Procedure: Patrol IC running at all times. Once alarmed, the host launches IC in this order: Probe, Killer, Acid, Marker, Catapult, Track, Jammer, and Blaster. The host will always reboot Probe and Killer if they are bricked, but will otherwise continue down the line before rebooting anything else. One Security Troubleshooter will arrive (1D6 / 2, rounded up) Combat Turns after an alarm is triggered. The Security Troubleshooters will assess the situation and may instruct the host to launch different IC. The Security Troubleshooter will attempt to ascertain what data the intruder was interested in if possible, though getting rid of the intruder is the primary goal. The Troubleshooter will not use lethal force unless the intruder uses it first.
用途:狂奔者可能会因为许多原因而对五行全球船运主机里面的信息感兴趣。想要拦截和窃取货物的狂奔者可以简单地确定携带包裹的运输船和它的路线,从而计划一次伏击。不过更无畏的骇客可能会想完全把船运改到他们自己选择的路线。组织非法货品运输的骇客还可能对支援塞入额外包裹的现实行动感兴趣,通过编辑货单,把多出来的这一个包裹纳入其中。当然,并非所有对主机感兴趣的都是入侵的类型。狂奔者可能是主机信息经济系统的客户,通过提供物流智能挣点钱。当然,即便狂奔者也会对期待的包裹兴奋不已,只是想获得他们包裹的追踪信息,从而了解到它什么时候会送到他们肮脏的小手手里。
剧透 -   :
Uses: Shadowrunners might be interested in the information contained in Wuxing Worldwide Shipping’s host for a number of reasons. Runners looking to intercept and steal goods can simply determine the transport carrying the package and its route in order to plan an ambush, though more intrepid hackers may seek to entirely reroute the shipment to a different course of their choosing. Hackers organizing shipments of illicit goods may also be interested in supporting the physical insertion of an extra package in a transport by editing the manifest to include one more package. Of course, not all interest toward the host need be of the intrusive kind. Shadowrunners can be clients of the host’s information brokerage system, making a few nuyen by providing logistical intelligence. Of course, even shadowrunners can get excited about an expected package and might merely wish to access the tracking information of their package so that they know when it will arrive in their grubby little hands.
« 上次编辑: 2018-06-16, 周六 01:49:45 由 妖猫 »




离线 妖猫

  • Hero
  • ****
  • 帖子数: 635
  • 苹果币: 3
Re: 【DT】完美主机 THE PERFECT HOST P82-105
« 回帖 #9 于: 2018-06-14, 周四 02:00:38 »
游戏信息 GAME INFORMATION

因为玩家角色几乎不会在肉界碰到主机蜘蛛,就只给出了这些安保呆子的简化数据。
剧透 -   :
Because player characters are unlikely to ever meet host spiders in the flesh, a simplified statline is presented on these security mooks.

次级安保蜘蛛 JUNIOR SECURITY SPIDER
这些低等级的安保小蜘蛛和商场警察相当,主要是负责“观察和汇报”,就像他们肉界中在商场里的同胞一样。次级安保蜘蛛通常把更多时间花在回答走丢或迷惑的用户的问题上,而令人兴奋的大事则通常来自于想要给女孩留下印象的脚本小子。他们并没有能力和条件处理严重威胁,如果他们遇到了强大的对手,主要会拉响警报,主要依赖系统的IC来干重活。
剧透 -   :
The equivalent of mall cops, these low-level security spiderlings are expected to mostly “observe and report,” just like their physical mall brethren. Junior security spiders typically spend more time answering queries from lost or confused users than anything else, and then the real excitement usually comes from script kiddies trying to impress girls. They are not equipped to handle serious threats and will mostly fire off alarms if they encounter serious opposition, mostly relying on the system’s IC to do the heavy lifting.


标准安保蜘蛛 STANDARD SECURITY SPIDER
标准安保蜘蛛是多年的可靠老兵。他们见过许多,包括狂奔者的攻击,而且他们知道如何回应。他们在岗位上并不是为了和用户聊天的,他们会保持警惕,调查可疑活动。万一有麻烦,他们会做的第一件事就是掉查清楚入侵者的能力。如果他们觉得他们能处理,他们就会开始打上一或两个MARK,然后开始砸数据棘刺。如果他们比不上,就会开始叫后援,或者他们会更加被动地行事,试图获得MARK然后追踪用户,或者是清理入侵者放置的MARK。
剧透 -   :
The standard security spider is a solid veteran of many years. They’ve seen a lot, including shadowrunner attacks, and they know how to respond. They aren’t there to do small talk with users and will remain vigilant, investigating suspicious activity. In case of trouble, the first thing they will do is attempt to figure out the invader’s strength. If they feel they can take it on, they’ll work to get a mark or two and then start slamming in the Data Spikes. If they are outclassed, they may call in for backup, or they may work more passively, trying to get some marks and then Tracing the user, or working to clean off marks the intruder may have placed.


安保处理专家 SECURITY TROUBLESHOOTER
哦,现在你走到这一步了。如果处理专家登入系统,你肯定已经惹了某人生气。处理专家通常并不直接出现在他们保护公司的工资表上,更像是他们作为专家顾问为私人安保公司工作。他们技艺娴熟,通过任何必要手段来阻止你。处理专家通常被授权使用致命武力,而且对此还充满欢喜。他们出现在这里并不是要礼貌地请你离开的。处理专家会立刻进行强大的攻击。他们知道所有的技巧,不会愚蠢地攻击入侵者,却发现他们比预计的要更强大。他们会诉诸游击,充分利用系统IC支撑他们的战术。
剧透 -   :
Oh, now you’ve done it. If a Troubleshooter logs into the system, you’ve really pissed someone off. Troubleshooters often aren’t directly on the payroll of the company they protect, it being more likely they are specialist consultants working for a private security firm. They are highly trained and are here to end you by all means necessary. Troubleshooters are typically authorized to use lethal force and do so with great glee. They aren’t here to politely ask you to leave. Troubleshooters will immediately engage with power attacks. They know all the tricks in the book and will not stupidly attack intruders that end up being more powerful than anticipated. They will resort to hit-and-hide attacks, fully using the system’s IC to bolster their tactics.
« 上次编辑: 2019-04-17, 周三 13:16:42 由 妖猫 »